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", 0x1000}, {&(0x7f0000002c00)="cc0d7679b13f21d1aacd18e1a298cabb489300dfaf8082", 0x17}, {&(0x7f0000002c40)="7b138129b899fa23e24bf2f4a7faebdcba431f847cf943541f74a287f00a53c6bba07d8b7cb9646e3be1368651c57e7d854dffa3334fbb0a4d9fdf38aabc36c648462829abf879e56c374b22acdc7796bdb1cd274bdb43d0f6ad9d4268059f80e8a66e556664372eefdd97c57a8f4d181bdff971990db79d46a7a5", 0x7b}], 0x6, &(0x7f0000004500)=[@cred={{0x1c, 0x1, 0x2, {r10, 0xffffffffffffffff, r11}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r12, 0xee01}}}], 0x40, 0x8}}], 0x3, 0x10090) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="24000000070607110000000300006030d8f1dd3f2a5100e600"/36], 0x24}}, 0x0) 07:51:38 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000507000000000000006800000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:38 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0xffffa888, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:38 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000500000000000000", 0x32) 07:51:38 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a0000000000000500000000000d009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 2176.656688][T23468] can: request_module (can-proto-0) failed. [ 2176.667704][T23468] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 07:51:38 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000027c0)=ANY=[@ANYBLOB="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"], 0x28}}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='maps\x00') lseek(r1, 0x200, 0x0) read$char_usb(r1, &(0x7f0000000200)=""/106, 0x6a) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000002a80)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000002a40)={&(0x7f0000002980)={0x94, 0x4, 0xa, 0x801, 0x0, 0x0, {0x1, 0x0, 0x6}, [@NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HOOK={0x48, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14}, @NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x200f1b93}, @NFTA_HOOK_DEV={0x14, 0x3, 'nr0\x00'}, @NFTA_HOOK_DEV={0x14, 0x3, 'gre0\x00'}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x2}, @NFTA_CHAIN_TYPE={0xb, 0x7, 'filter\x00'}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x4}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}]}, 0x94}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000040)=ANY=[@ANYBLOB="f60000e901000000186a5600", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) sendmsg$NFT_BATCH(r2, &(0x7f0000002780)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={{0x14}, [@NFT_MSG_DELSET={0x20, 0xb, 0xa, 0x3, 0x0, 0x0, {0x3, 0x0, 0xa}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_DELCHAIN={0x28, 0x5, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_DELOBJ={0x5c, 0x14, 0xa, 0x5, 0x0, 0x0, {0x7}, [@NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELSETELEM={0x22bc, 0xe, 0xa, 0x201, 0x0, 0x0, {0x0, 0x0, 0x7}, [@NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x2284, 0x3, 0x0, 0x1, [{0x24, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPIRATION={0xc}, @NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0xff}]}, {0x548, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0x114, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x59, 0x1, "7eb4ee729a4d8f4497061e52b0329966f5feded0be7a72189022af504f208434a2fcd5c6c640f9174fa0719c509e95c822e048645754e70c554e2a5c4f4939cbefb08aa3b457b9bdcbc9f692686eed77c2b5eba4ee"}, @NFTA_DATA_VALUE={0xb3, 0x1, "4e6e8af7c462f797feba0ff956bf09ca37be1a19c0eb1e476fb6fa8cc3f50b03d6d461ef6a0d5cdea95aa0120bd82332ef486572609fc65034c5b092dcb0fcb09cba36dcbf541a0ae8387aedd69d82ab887ccf234414b3103511976534c089d9763b6456640bbc116d6890014cb1ec7805bb663cd2be1b9d98f56253d9f9edb7de953c4c12aa36f3d5ac9ec4c4c4f86b046865862542c5c36dbcf02a4d1903cc713579cfed749c41d10bcb0ebcb0e6"}]}, @NFTA_SET_ELEM_KEY={0x9c, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x44, 0x1, "ff061c9d7a9e35c9aef6989968b6ba9cea6ff34bec843fb4f8e289e859d85d2f9d855c07bc242fd342941e34dc1c240f468faf9367cb6bf989d5e4f8f3094e6d"}, @NFTA_DATA_VALUE={0x54, 0x1, "0cfb7afa88bfd1d82b262aaca5709ae55196962cb31bfc4b7129726bfb400f968bc093fb40b1d7e492ebd4b8849195f96050bf1900caa412b8e1e0a9f28b786911692ba418f4ecd712100f3d4836a492"}]}, @NFTA_SET_ELEM_USERDATA={0xee, 0x6, 0x1, 0x0, "33e70f03125fe83fc66cfbec9e95c04e62b3dabd7b0311eaffc14bb87ef828eaa0c34eaac934aef4ef01780bd1da9697e9ee7f20ba221e8ab05024aa10fc5c73400d0b1af1f0453e516ce5257e869f08697c7855b2a16620dffabcff1ceb417c8b0adb09a60f49c5d94d37bb9e8cea1bdcffdc81d366cc9c5648506ddc249502fe4551eb1eb4b6365205e279572576d072dfe022d29c23b7dd8e5fc7086200d02ce77fdb90f613f40e72de5498e765a39bfcf015a6b7e9003f95e1f0879ea196a698433dc81feb35721acaceaff1c312b2228abb9bb1abe629555b1e21f93c3be6d2e10dd3bbf148aa8a"}, @NFTA_SET_ELEM_KEY={0x2a4, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x9f, 0x1, "9e74bc810ad28057a366cddf90c6c03ea7b790e6f2001bc2caadb2d13501f92d3ece0ddc96a759df2de70be5047749ef77cfc87edae64bef2b59145ca1838ab3ce27cefb23f65a626117d2210f5c487bcb2f1c6abfd9c18d1078c41be494ed2de4a99c9d78c20d75b1f9d88ebbb09fcfb138df8b17a285365ec8bc2e58aa0c8c568df61f14052b1520f5d63b25e07d2fd9d66f8a4562d9a25bfaa3"}, @NFTA_DATA_VERDICT={0x44, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0xb9, 0x1, "440993a5a3a2198e9045ecb3af352d7a583d593d80158c8f294c5e9f2d55a4b327884ff2af377f9277bfe17e29be748ffa3e1e4c82768274749e27ebd27f6e84fcb9a3b5728d3a360b0d8d054c7adf6238a60bb6f16de41751753789974775e6aafe435e7365287edda468573a5520debeef77ef4b01740865c2de2aa665eff6fe2715826333a65a9f370d8d22fe7a5603a934206b85c402d3affb89e00b4849af0b05187cfc31f60885dc3f2f09624f8e99dc1e64"}, @NFTA_DATA_VERDICT={0x60, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VALUE={0x9f, 0x1, "8cbfed53eeac98c0a5c6be1676454a3f0b7b84981dd604422e246fa48023ecf55de242fc00a2099eee405883d200aa43e083b0a40fcefbd89e58c2d19059522e9a77be0c89857df2fb0e4a330151136a8893365db1d4076b615c3fb262a2e1eef50ecc9b2d6a6601d93cb14f35aaad373cabaaa3621625d86d11f581fd20c42f888b92ac957342d7fa2a5ec22d0e47c3560b88b4316e9f4b46ed24"}]}]}, {0x7c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_DATA={0x78, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x73, 0x1, "f55e123c54e8c6af164cabb9fa1be40cff45bacb3fd39e2c361f5cf06d359310250ddb4a55ab16d7c106902a04396168a2ac3d82051be59b6e6668baf313e0c91b8a9a2c6dfeb867d683c3751187dc9430683456799980ecd6803d7ad637678fc2cb5f72d26ab32f4424b2b669c618"}]}]}, {0x10, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}]}, {0x1310, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPIRATION={0xc}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_USERDATA={0xe8, 0x6, 0x1, 0x0, "34fc001e89cf340e156bd0195efe8a7ff03cf4a96b885de9c72607a986d63112c915d27951c3661811fe0700e2cbf03326daa9be01c8a8c3a45a17bdc6dbc4d4f996dcd8ff48153ead285fc12d009097841107b55021256e81f546acd445a283e5eb41dd0823b56b58effc5fb25838b46f69af5607c3289dee414b6063422a8eca204f465ec19163f95e4380656e38a9e43cf6668c403aaf5cad835c2781e4af178a407d26f587282b4fe4ccd65297223c2872bd6de1bebe9c480035a14f9cff1cfa4248e2cb0c251d8df5102d992b5eff76bf1bdfe28c09701386f33d578cadc2dfca94"}, @NFTA_SET_ELEM_KEY={0x119c, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x1004, 0x1, "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"}, @NFTA_DATA_VALUE={0x69, 0x1, "42614f3ef90080872d3916b9a8855aeda2eac2fdefb0d013b7b32e2dd51ccc0b9aab52456e3cd7fedb0e9bdaaa9b8a5d1eb2339b1fad54e2f32554c459f06b4dc194c82f6a0d84e2fb783b8446770cc1059f6212c666e1d6c75fcff9186f98cbbc33b623f0"}, @NFTA_DATA_VERDICT={0x18, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x4c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}]}, @NFTA_DATA_VALUE={0x21, 0x1, "a6593c4400ab2d780f8bbcd15ccac5e531eab60dec4947227178579d81"}, @NFTA_DATA_VERDICT={0x34, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}, @NFTA_DATA_VERDICT={0x40, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}]}, @NFTA_SET_ELEM_USERDATA={0x29, 0x6, 0x1, 0x0, "ec185ce7f36269cf1645e1cd2edd0052ab9f91fee812e82e0238237b6c6e9ccc86de3b2df4"}, @NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_KEY_END={0x34, 0xa, 0x0, 0x1, [@NFTA_DATA_VALUE={0x2d, 0x1, "64a6e201572d475e067010da58be304921347f218004cb712cbb772d28f13c8952d950e3850c2ad38e"}]}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x8}]}, {0x344, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}, @NFTA_SET_ELEM_KEY_END={0x1e8, 0xa, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x58, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VALUE={0x7a, 0x1, "4b787fc18f18d813229e15b9042ddb08b302e41e19ebc9219212beb52dcb34db87e7ebb5b0d0659fd625ec3cfd4f643bdbe071c4ba589d1a64ab56be8e3558a7300b28dd80dad9d8a8b79097421ca522e5795b1e6cdf3e926a5bc974288b6f2a4dbb922ff1e9e4cdb41ba94a2c7e5eb95dffc68f5639"}, @NFTA_DATA_VERDICT={0x4}, @NFTA_DATA_VALUE={0x16, 0x1, "509f8da6630044adb101ee3aeaf6dceb65a0"}, @NFTA_DATA_VALUE={0xa6, 0x1, "88b1ef93a8458145f980d157b62f618f1783f5314a7fbd17fa2ea38a29571e44b428bc9c682581316a5b4900bd97a59fe27956aca29d06ff0b3a52bc8de5fe106285bd7e9c55ef78488f2d505e77139d1b42f79e4d7b7d4b6f3d4069b8e2f780828d633fb84f704d27fbcb5165174f2ab812d90faa680241115eb1ab4625c55c6ac187315bca5cad62a857f552411a8e5db18bb2325523b9e36ab76fd48174cde9b7"}, @NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}]}, @NFTA_SET_ELEM_USERDATA={0x8f, 0x6, 0x1, 0x0, "7690672d4a57910215e742634de4aec650679159bef99d0dcd4faf1ca3f9c67dd71f767d99eb7c6e960860143599168b874df3ef50f23845f5ff2cbf9930f1720d724859016c3da397027dfae431c312a2bba539146bdb17cf70603fb8a4353974e364fafc86d0d1885e8e548f807bcdb246b6b18cdb4ecb2ec360160fa247e92bf0df4fefbf5ee7607396"}, @NFTA_SET_ELEM_DATA={0x98, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x83, 0x1, "ff99242c63e98964b9c03fd8da242d55f38d58dac25dde0a6bfb905c17aa414339a102e3a82c4b637da18d2d53b2445783a6220e9aa77e083aa16e2adf00c2d44d2ddf0dc41aaa3140b03a738261229f2b9586aa2479d03a5baec6bc53a758133e024f57af994c6f957aa4d1592832080f312e8b090f864fb02d28c9d9932a"}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}]}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x80000001}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0xc04e}]}, {0x3a4, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_DATA={0x3c, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x38, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}]}, @NFTA_SET_ELEM_KEY={0x344, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0xd5, 0x1, "e32a8a52bff13e3a295854d527fb92c497553e323f4e0fdb756205498c3ec616557f05b31b337103fb487ef10b8b4d712600d1f1da5bc579a1e7aef28a57983b288396178232e0a193322798f88298dcac9e82a1bf7a4dcb2dddd34e30cb5ab15091d663aff399b7e18df71f0a80ce780a647b7e3d85d7b8c673384f87eeffad92dd6bff3f8c1bfa53c7beee7e0bc4f57f0f0a53b46efec404816e8a4f395b694466c0dd74b0ce6bf011385f839336408d3ba341b68475b305ab8dcbad06065abbb9337e444b767a8d2c181d675660d1bb"}, @NFTA_DATA_VALUE={0xf3, 0x1, "53f06af28675b6fec228f78efdcd30c1b911db585467c326fb2036fc097061637865ab2b1dd30d9ace4a35320513220f94a02e035162fab4694e7d1506c055f99e4f5ff26b60ae4886b3e7487777344d3b9b0e93f6bc9ab00f7056eb4256b335eefde0794204ad47f3ab3a6bac08a9cb26b95a8ce42bfe3bfc35240a67e90a906ff622b3a266aac94e8d387ad06cee3eaee23d801a385bbb39003f51344b106730473ff03eeb36ac4d77a488a7e1270e3c7287b2102aac1c54a11f3546c19d6b25664e581a06294d072e2011edfce0ba6241a60f9cde017eb3edea88cf781c2fd6a6927f623e83560a8ebb1ab105d0"}, @NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0x63, 0x1, "e86b0fc4e09de906d15a251906ddb6116a3e03222dfaeeb8476c9a3f6495085d797f26dc0075e4e84a59a5fc08c0c68530f9cf4c7c1bacb4528fd05a20494fad552223c1da9366a1a180b8158896d204f8f1eae08d508d9cb3e8c437bd8bb4"}, @NFTA_DATA_VALUE={0x79, 0x1, "419ebe2b143fc16ced2d5730433eaf791fd01f27bf76c9582845bac74af8da9ef86f60a4cc6ab91f7bcab310e8870d58fe7211b906f36c68bc146378c630fbca39a8d24e49966303a7a0b023217a3d68c2e844d83837b878a23eff588ee7509d9e05f9a6b1c1d06849ace74014f53f6838b2cf45c3"}, @NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}]}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}, @NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}]}]}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x5}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}]}, {0x290, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_KEY_END={0xe8, 0xa, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x18, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0xc, 0x1, "35a9112d540dbaf6"}, @NFTA_DATA_VERDICT={0x3c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VERDICT={0x54, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0x5eb7959a066fd059}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}]}, @NFTA_SET_ELEM_KEY={0x184, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x24, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}]}, @NFTA_DATA_VALUE={0x10, 0x1, "6eca360e9cb321f2813dc3ef"}, @NFTA_DATA_VALUE={0x5b, 0x1, "f1e15c7aa863301090a51f88455151fc2551828447b36f85ac260c893660df26e9be4a8362fc5cba22e373744c926c931a6eef57caa17e7d99643e893729f85a42995a2214aa01b2c7557f11bc56e2dbae6d97e6816f00"}, @NFTA_DATA_VALUE={0xef, 0x1, "f08821a3ff02cc78bf71af57ac846b9334a6c2cb2cdc07d5d431e07d32297e7647cf59684d7b628c3a27fd9d495f7fc50bc4e5dee0acf84808c3d97f1ae6cf466ac692609cdaa1a9895b0877accd872c0d352bb9020261565d8db9e1804fa6d76963a9bd9b5cb5c21ff53d1cf80aa6f203507b961371b2b45bd53cada5214bcfa028e3e40f657057b8d4f421f3305d0d114c34b8662e24c18a0a108dea2be9e9076cded37066d291abe89c6ac95ef6e7a0c92f494161c63860d2a9a4bb1701be497fd416377cb5d5130a51dda3850ac53d8e4cb921591458aba37e5dc06a29d8870e607ec7bfb23113af87"}]}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x224, 0x18, 0xa, 0x301, 0x0, 0x0, {0x0, 0x0, 0x8}, [@NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x5}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x4}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x5}, @NFTA_FLOWTABLE_HOOK={0x104, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x68, 0x3, 0x0, 0x1, [{0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'bridge_slave_1\x00'}, {0x14, 0x1, 'veth0_to_batadv\x00'}, {0x14, 0x1, 'team_slave_1\x00'}, {0x14, 0x1, 'bridge_slave_0\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0x4}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bridge0\x00'}, {0x14, 0x1, 'nr0\x00'}, {0x14, 0x1, 'batadv_slave_0\x00'}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xfffffffe}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x101}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x401}, @NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'vlan0\x00'}, {0x14, 0x1, 'geneve0\x00'}]}]}, @NFTA_FLOWTABLE_HOOK={0xd4, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'ip6erspan0\x00'}, {0x14, 0x1, 'veth1\x00'}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x5}, @NFTA_FLOWTABLE_HOOK_DEVS={0x7c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'geneve0\x00'}, {0x14, 0x1, 'veth0_to_bridge\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14, 0x1, 'veth0_to_hsr\x00'}, {0x14, 0x1, 'ip6gretap0\x00'}, {0x14, 0x1, 'ip_vti0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}], {0x14}}, 0x25ac}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) [ 2176.717799][T23577] device macvlan0 entered promiscuous mode [ 2176.755558][T23577] device macvlan0 left promiscuous mode 07:51:38 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:38 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000600000000000000", 0x32) 07:51:38 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a0000000000000500000000000e009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:38 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000507000000000000006c00000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:38 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file0\x00'}) sendmsg$NFT_BATCH(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={{0x14}, [@NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x3, 0x0, 0x0, {0x3, 0x0, 0x2}, [@NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0xc47}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x2}]}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0xf0d88c1278cec4ad}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x5, 0x0, 0x0, {0x3}, [@NFTA_SET_EXPR={0x14, 0x11, 0x0, 0x1, @tunnel={{0xb}, @val={0x4}}}, @NFTA_SET_TIMEOUT={0xc, 0xb, 0x1, 0x0, 0x8001}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x2}]}], {0x14}}, 0xa4}, 0x1, 0x0, 0x0, 0x801}, 0x41) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x2}]}, 0x24}}, 0x24040004) 07:51:38 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000700000000000000", 0x32) 07:51:38 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0xffffff81, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:38 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000010009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="24000000070607000500010007000000080006000000f07d"], 0x24}, 0x1, 0x0, 0x0, 0x4000010}, 0xc090) sendmsg$NFT_MSG_GETSET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, 0xa, 0xa, 0x801, 0x0, 0x0, {0x0, 0x0, 0xa}, [@NFTA_SET_HANDLE={0xc, 0x10, 0x1, 0x0, 0x4}]}, 0x20}}, 0x0) 07:51:39 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000800000000000000", 0x32) [ 2176.980974][T23805] device macvlan0 entered promiscuous mode [ 2176.997371][T23805] device macvlan0 left promiscuous mode 07:51:39 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000011009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:39 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000507000000000000007400000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:39 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0xffffff9e, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:39 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000012009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 2177.094353][T23916] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2177.114773][T23916] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 07:51:39 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000900000000000000", 0x32) 07:51:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmmsg(r0, &(0x7f0000005940)=[{{0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000000)="eb", 0x1}, {&(0x7f00000001c0)="4d1c9f678436f24cd0471243f8a5bc745386f896a30b0ce0fac2c53bbb573c07d5ebfe346d5e09ee7c266d958cd6ef4d4a5676cd3805d6b0b88d9c8d1823534ab2fed74236f96165a46dde25a7678d905a37686f18e18fcdb73f19955b3a510b268f5ddc4195d2ec968d8543c8561cbee15e27f182fa409eca92cbd8bd2a51a8fd29a36ed45ae797849c3ed965b9e8007bb585e478be8578081dcdf4cc7473afd4def2d7ad36b80427e89d448ae6f7f11c6633bbe6d93a590af25aa35749da50beea68cd1772c42b15ac41f544fe991707b1e5ab7d44e7", 0xd7}, {&(0x7f0000000040)="5f24cd1b207d31659c09986ef3eace2f9b2b5d580c60e5b8fc905b2b2fcdc621e760c1ad708a95cd4f16de6eaf0861d02c02308752899017fbd324e2eec4471a390ffb8e46c1b4", 0x47}, {&(0x7f00000002c0)="6c0fe66abc8a652f77c5b47ebf163aba77986f37e7e8e5eb645f0e27b4042429fde0760125fde5d8d9eed8a8e495f175012a7a5332a137eb0196d30a69417f025c83fd4c0db5fcc92293e7635f23372674e30b08290b078b18afcc75b791e1069a7c7d8dbbe521d7b073a9a32e4c28d8", 0x70}, {&(0x7f00000000c0)="2826b0", 0x3}, {&(0x7f0000000340)="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", 0x1000}, {&(0x7f0000001340)="67ec86a07dcfa09137bd34f89429d3263fd7c1d39f23d49523c6af8e61c7d991482746a57eb4130e8d047657e179c52d2538c2a0c39418afbe2c5fbed20e4ee3f6c5534b5655615a749ed679084a65fc17b472bba9b3fdcc8733239d808e1671513f9944467d877574b05b477234c1ac4ec6309140dc0bcb241109d6a3c7ea48de2b788935954dd14c12c74b98494aed89", 0x91}], 0x7, &(0x7f0000001480)=[{0x60, 0x111, 0x80000000, "c944f0ef17c9117e1f9e6e137b32a04dc98a1a7056fc6ed44b5d59b43ff59374ce5ac4dc754125ca6cbdb75d3918f4ed2f5779a6b5350e446e56aaaf0a421ba061600bc5211df2cfe3"}, {0x1010, 0x113, 0x5, "2c66cc89a20703e5db765f1ce6542e9959f9c1bfae4d45d662bd52b1bb72f61f617d4576ee30cd6591bef3e23d5afb8041898f113070adfecc0c3d3b15c196ea8bb1e49870b52e00e4b3d3c9e60502f9ebb709dcc124eac8c2ceffa4e467e9c949088490bebb90aa66f148e4bdae48ac53aac593fc3b365276d573fc27b87b43c3445a132ef3c929963c20d522d65bd962ad3657bd3bdb341cf3c5201c7c3b603ea81c619c4781b81a4da15b45b37fb7c5bda2cf6a184e8c7ff016de71c5e047434d0d47b536fbf0464f624e2b514652c954ab775a0be30cd63fa67e30877bb96b048abcaa71b44dae751fa73afbba064b713573853215ac57dfba989a0783c86bc8f9fce85e6bbb9d627a30f533da2af358df23ddb1c9f059f05566109652451531b8fd1d11e75dbebd860520e926275eb6183c82b4e36d57f7e9b8852506f502ccd56c47250244b1a8ce451ddc68ab552f91358fa1e980a8c95c62778d74d7a0795378b3ccf5920dc20d900cd1ee894618a816c77cef893f8fc56e2394701b4c767f5ab6c3eac4b33eae05444efe21c2775769a03369210a10024dfb5b98fb9df6c6e615e99a99062a41a817e2cf86b7930a76d53b1efbc164b39d73f9253b6178bb6e569e3ceb0c0d07872fb05e248dc1d482bc669142637b110f9cf282d793a560779c6b15b9af9d2aee5c5cff05ee00525b08bd39ffe5f8bf0d31fb6635561c6cc32a662cb1acd6280461dff873df35da771b87cd7f37d002c8fa7f4d4b81efc7b36f3b0b7d2f4f83c9356b5a2eba5757826adbc94496d7b174357763ccdc93c45cabd95e92789a138a19e631cb1720bfa54fb2cbf529477f9d584145941221b8333d9386c5f708e543b7a526cdd0613901c5f8a3584f5f73c80203f14f078c8f974695e18047327102c81f14b1a4db88afcb63c1b7d1f079c4c7db3989d2a710c81fcf344ed4ded9e853fd5484b3a7d2870b00b25c6805cf261001ab198e3c24c83166e684ec0a49704cbba678e6260cb8aa8cf0b2c1800a2e40aaf32169e8d50375868f287f835033e5f7cce485c9fd1db3779f31ac75be466a97bc3dae0a61eea38a75534c875304c0b1b32bf3f9ebd6dc79f3aba1c2b499c941273cc0ec7c90ae167813ce9a1e2e1940d216a02d6721be5247e1bcd6cdb350b124c533451301f31e2877b9b67fec70f07eae3d12064a8fc185b5723332ae929cae9c94101ca803bb6e6857a47874d0336b38edf14595e50684e0b54c6ff6d90aea3cff885f5713ac566215d66593b2292a4f051fc8124b2902387831eaf728cf14177d7a47d0d4cda87360a03696a030878eb964dc9f69094fdd1730405176c8d5f4fe061f85540092bf1e7596dcf7fe8af1323752ec4521ef2514b1786c04bcd7f2ef6581c37b9551a3f070864f7d3eccb699c0527636dfa7993881d14b8e7ef369da4bb013074d11a65bed1dd6293a1e74d1b8803729c28537b8ff24c7fde6ec14a4ae674274186500b9a84ae3492866b5fd956f39f64058db8fdfa9ba219b1765bc00a4038cd30bf77ee7c4290f50b612c585a01bbe2c1d0e7079c3b0e8d625d5cbaad531b0bb72328c9a37938d8a108ed16f87372fd13aa5395a6c72f41d7eed27b4a4b4d1f184b42f3916a4613339a593570ac933dcf1ec3ac74a9a0a15f507e2ca7c74ecaabc7ad28bbb03dd599b2c373c1f97829fc2d2badf3d8fd7e5c499b072981933f0ce47e5fd74f8f69d96a5563708e57ef759e21f923e98dfe94d927ec1ce988126a1365786b4418b196e7cce77154d273c4c229469344e2ab7c89f5da98971456b2d7c77126a2549e302a710add3bb13b9a979ac2a142dd7d454adb0f681b29d0f477141026f7182a45fd33bb06611cf65cb2680c4d78a8e3d49cf9ed299e5bf8568d85edf138fb2ed7f9d2fba1d577b2b05b86c3d2d2fc1cc8e641d277443a634806a95c37d84619b0119ceb681b1aaa36713f5403401d5b5c7d17a4eff354da7e5083f578986b2c6341f1a8fd5630618d2418afded675586f96ceaa659fde75c54aba3b9b3bb8a88c4331ae8140b3572602ead04394ea08cf62f3c53e42352f0081a7633530dc3431db28bf6087e20b7d0839454f44d02e1d9952db58f1b91d45a6eb88425f0c2093853b146d41ac2845e1a67427ddc10a031ebf61547ea1acfafacc2cbffd47eb14682033a49f37a954845adb863e1ed1ed800ad303227bca679c8ef42060b2c61c686e502e3c6d48d355b23ba6e742d59974e39bc74e2a62008bc96071354c95af4e390f049d0c4671fa059302ba20da6575ae9e0cd24a58cd260a68a13576ae040601c9e5e9e062c6b3969ba8a7b6a4eafa6c835f9f5ca0fa321bc3f247e293b6ac566ea88f676a68374e8e912ab21ca2cf11fbf936237121051284e27fdb80b99bff28bc2182a056ac424666a9b91b05d8fdeef1ac4c7a7a4ecc9e598c7d9b01ac89fc48b14f48d964174e3a5482b4230456730abd96fa56b00bdaaf956813b876ded377ec2f883c19436031e3006b8111b1e2ebbc0c47eff31a523465b36abcc682815adca89dda16a8b005bd7b9434af7f49c547ce348dc2e4321b05a7e83c42e38b515b11f1588985a2edbe6f57af44448b49b65ec75c48ce1d7fbfa8e9bd565c64e0a9b1ef3439d26ca563d0c91f9518d19618e3bf2e497b3c45675850f4e6807bc9ce1de4f067e8bbab8ea2bbe8df1569d50fcae4d9ead3bd92b0d1fca22ea572e47c85a953524e593c9b3bc730b089800cf487bde7ee153fc78c598a0675cab3d160e8e3cca7c8e567ee9c94670b6e667cf684cab6f0088a2eacc3793c92c465fa1c4682fbb9a2dfde66d7ca08195179ffad9bcd995d699fe69580f60614ad43c93b1f242e6f5feaa124edc7aa772134635651e4c2f644ee9bea9b9caeb2b033239f03224adad36df71e6e72cdb09bc0d39ffbb92f8189ddf0e1e1ad7f5d5edfc1b7434b4cc7082376fb23b5819f1e4c7d1a7857a84411d801e9df02dcda68b1dce5ee94b8f2cce5fb40c9bbf87cb7b0d38256bce9f0669269fd4ee5214fd8bd70ddb238338924f16a543945d10fb983ae458875817f6c192c6e44cf24572f33a642489e3a8c167aa4e5966b7195ba7cb10eee86351cc2cf9e8920eb0579bf8e1d093af9a7fd8127f9e856cf0fa513c7962bc9b609d7107a2ade8c90aa68c544505d594b8e4d9bb131d551ae63992613f546bd40b5177d9517c10a9e765e87f9f9570803f4d7ebfaba98a233b518009689fcac402940e4425a7ca5a75399afdd65e606a891154cab8854f59165ac91b1ef70098d6117792cea74a9701f57acd47212d8c51d36dfc43273a604a1c5c0598d58a199fb5891a7c8ef0eec3c50629628ac92b460fba443cb024550148ebd446dd93dde87c354f15baebb76828b0e128d7c2020c392b06c4fd59173949089adf54f124ffb27bb3007124c7588c48b1adeb046e0ff072249d78bb5e40378e278f9f509a4e708a9963a5ddf53c1cdfaab1662fe12c0177968236f4240801e4b55a6f0c869432339d68f52395ba58020dd85a400ba2df282bbf8cd9a656fbfd2aa442b322326520b2e6203d203cd190c0a907af010a2f360ba3053883b5effde84ee7114efe21a17a3771422b8b98fdbe20772d078f7f2365c20e7110ca2b2001cc3faa0bda8a99f6b584bce32342a028bde25f3054703e75793c23eb19960c1ac721de0722276c6b659b369ac294f199994ac7cd0094b4342dca6a6a9535d94c5fc8a9165aaa5da403e569ef412d4c1e0d370fb88a95b215c1fca2179371e5bd1a289254fb25d60a14e317300d0f3604b55488a5f07034b323b3ad7ce04a70108355707ff3510ef2433b68e82ce7c3abf5ed889b2a7a3fe94e6f409d7c0897ede3d6d1fe81326a9d3556254639058dbcc335928fbe26814943ac8981a5b6f03df231e1982299a0bbf1a3d8ccecc9ef378ec9cc97caf4cdca014087f53998785cd198f01352d65b30f33613e8da51e8dfb9e297acced7332119bddd3226dcd47720dc128da40086c512abd87bb7577f6606a2d363f0b345ac140b9fa31db5a4e07d29b76a81cc4a90f189e50b510215abaf37a11d55a1e61814f0bf72ec429d5a38640fca610ed9dadbf724e0a42f32afaac0333327af75152a533f80490b496a150ed0e6c9012880bc0c93a30c0d3e2ddf48b5e428682119324e44614d6a14cfda3f6e275b7a8bb04213a17042e774d39a4c80b78eae954aa368916a3118bb098889ca711860ca54a43926a8c62ce9c0c4a6d9de37ac392f9a8e6e5e90419f6d10b45992413ada81bb6773e20ded689e28f7a0f18995be3e34ac0219037af07fd6df641a07558e306fde35c311184329c201791d14ca6ddd66e75b1beabf06424ec5682bde01759c163c52988a29eaadd161e7b56ccd2b4652ec512f77b48224a8bac406c810662ccd522bdc74ae764ee82d2ac19ab8d7ee95290d9bfb4feb6493c186a03ef61c1e89571c4a0aea00bed1666b9e4985749ce84c07ef0cc531ffee55cc0ebdc0a52b9ae73662c3ea34064d753e24570876a2bde0f7ad3a1928064ebd4fd80c94d387b568e906f63f04ae19a20d6ebc0faeb87bad7e37a51b34d49c4463db62eb52992f0c57d2987e36c94198425507ca758b504651ba19abea04e857fbd4040eb74e12b1bf7b6dc74654c298594a0276eefd3468e4542d7efeebf499769342988701799d952e00c625e66d5f7a8f94463fdc9faf7cb2cba905260094fffb4f7f67a2348b2e9421787bc978e1552752604bb8489fbef84e7b66dddeb2fa0a4e0d881de92ab83df867eb10ee74518ffb96db676c54476574ec0a48e6d9417c97f6e8cb24a811e7ece32ea4462b6d5578721835db67894227de61219ae3f30f9fd04a8647c1c8be468c2b37a1c2b9bcc1026dba373a8a541867cbb22f04e0bff0a298672ca2eb48af50c5d83defdaa479f3ade87874dad54993993c12286c6f7d95e989afa08d2367d8cadf94cf778a8ad7017dec6e8ca1dee1e94cd8117e0b572f4b3297e4ea5ec758d8c94c9d3c233c2527e99d57130de58296219430c0b5c48d273011d5d8263ca151993874500442d8e22a6a0a08c747bcd0ad7038d092ef5e9ae315c65842dfb569cacdd97337a889ae0231a2e9bed6c0e58c7ed27497622ce10620bc82cbe6b6198ed47ea484a00c4cbccaec44bcb8e9e6c2ef538e59e489c64a46a118597db816cd4960f6554704d44eb37fc4fba7f3267d6aaf574c56ed0e2e722eff146b118b3282829960dcca169c7399f03f73c8b1d4f266c981cd272e3a0d6316ff028eb6b3df5ac67a77c8902d90393de6979ab45899c490199b9611363f94bfe4c04a526aa37dc7b6f4f132d2d6b68f99e898d8b93560dd344b30039c6422d1508c12e837c11636d614ced208128f912477f05e26879b7548b810addd51865d094ce930b0c3a29f7dc47245a3de8f0d7e417076eddd9b50b3f095711237c1dda0457e851246b28dd85d65eaea2a668071edc9b95222c8ae77455fd7c1b4f11e57851c15a825d71c760e512a166e0410af49e4a20e284b12e71c270ec5595f1b4583ddd054226ae2239f236566fac354e40283df1761495b45d5aea708dae114e57322bc9f5ebfd7a9aca2a657ce30264d8fd1ef6ae57d8de76e65e800c72bd7e9a75fd99f4844f5c418a88f9a8f54c88bec0cd69c8c20d75d716093b4d6a22129cac53ffb830719088bb3cbed9dc9d7e6c3216bed4e968d66873f7879939e75d62614d0797bee1d9f37b8ea3bd6ee76e9b757c4"}, {0x88, 0x110, 0x5278, "3cc89c166240ef3b65f925522c5ca69de52642d930111c13aefcf5436bb274570c4f0abd5426da8bf1125e81c463bc822fca5d24c5bee508a89781cf14c448cac59305ef5eebeb9d6d487418c7fe03d91c3daad8e58de10436823bec472b4d519b7ddb82795054bfff5278d061276201538b408c"}], 0x10f8}}, {{&(0x7f0000002580)=@ax25={{0x3, @null, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast]}, 0x80, &(0x7f0000002880)=[{&(0x7f0000002600)="3b71d25739d68ea9c71350fb0c04a960c3e98a012df4ba21b2ed0ce88fd38e21c9f3d79dda4edef3d53ca8ae464302d920fc82761e6145ae46349a9ec81cf143a9aada5370f69ae23d1b9ddd42f74f54ee6fe7f76a319ddbeb1284dee89fd7e8c2df4570eac665f3f89eeced79786e0aa472021c4eef09d9c738e9e56fdb29956160a67bdb854d9b39b911111cf1ef50c9c0a0e6050d4581d3abd3059a0c2fc6846b9b89710a8e8e76805314efcf6a", 0xaf}, {&(0x7f00000026c0)="5a9bd2b3dab0aa1160393b3828ec1ba165a7a3fc4a4a9afb76d04aed09cc014c776252544ad960cbf9c66cbdc7885a77d22c40e931128a3aae026de08666d1f31aca5b386b2531e1adc4f3fd53be6f749f4cc663a64564cac91b2606bb01d4138e49658a01a518cb24ff45f0a7b7890ffb711e55", 0x74}, {&(0x7f0000002740)="1208516b6ca3e24334d6fb3dfeb444ed98918cb1c9221a3b6958c84ccc094e8828487f12ebd991a169818400139cf1b06d42eb6c14e6b93a6cfdcf66cf199ea317e96d864879773107d50a88935500834c6777d9854f0a96c5495f8eae83beb0695913af351a2419687aae078f513b390290f7d43e5ddc9f604e07", 0x7b}, {&(0x7f00000027c0)="be147221aa2baedca94172883ac029f5c96465f73ccc469382a22e4b81147ee9d85ba8e9a0ad7800c4027de155e308f5709cc7571c6d30144ca6315e947600503f1dcc7d6d1d790dd246af9dadb732fc8f934e9d6b849cabe48a97b1ffd303cfedf446a6f58eb89159aece5f8aea33ac1a5e2cc9cdf4424466dab9a06f4d9b0d3c915ff77151", 0x86}], 0x4, &(0x7f00000028c0)=[{0x80, 0x105, 0x8000, "52bff8e46f3632a87d77052f71409ec5261d16ce0b10ea5c97d07de2f94cc832256b9a140274c0bb5a8ebc630500694ef01575aaa3c46d2ac420f0cb8baf007840146a436a09a5af5866862b3d2bfbadbbdc5f6f07193c67c1d35dc9f34a072230a178c3cef3bceba4a2"}, {0x60, 0x84, 0x6, "4c8758b8380b2072d098510a4a03979f8987e27301261ded68505271b53a5138f4a44b9a711e58b010458d587cd60d6224a9f9bdda30a42e2aaed8740e5d81de0d471864a2bb8223ebf0d1"}, {0x1010, 0x109, 0x10000, "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"}, {0x88, 0x105, 0x7fffffff, "657342cbfe4e926b6a08a4e6fa56c25299d53a9613f81b14c1bafa8766b26f96722470fd0d99471b1c299d00d29d84a33a3c448d10a6879454bcd5c4a0eda877fb16af471547528cc68b417879c322965a9d80484fd741e6bf50e20420de84934d43c4b1ee37865351b52c02e13a618adea4871149f4"}, {0x28, 0x117, 0x8000, "bdec4669b8ce85ba37016734dde83c491f00743f9a"}, {0x88, 0x113, 0x7, "a7a95a7ce52111ba82080cabb72376e12fd8a4226c475693e1f4e10393d7efa59a5d9120d88a9f5c1fd90219bac8f222f54c812ce14d0a40d3493f7363ecbe9af0bccf80aae714cc1e129069b95e0f51d204496801e031938b7abda3de52fa55d2dd9e63cb14aae8be68dd797ad8243fcddd"}, {0x110, 0x84, 0x5, "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"}, {0xe8, 0x128, 0x7, "1e861b465ab51745855c04dc0afeaf81983a4c688e76d048012e75217b49da1ecf638cad581ef76285b8e1d84b06175798e28e388db81b83f51ef9f13bcb5d3be2b86d07d08dcafd3a4f9631f0f029cd1c2c2704942651719c6309acabdd06761a99e1b6776f98d6821f0954fe09fd1cfb957af0e1e79180b5b6e6b2434a833e0d595a029bd392b7c2ee9b0c9da731755897adfcc9675667b4d422b8dbdad99de82690e88c442a0445d5a1bcae98b720d3cf3486478a0a10e35f14e8384136957a16b0dc21be1b141772f792c1bfe9d26b719dc6eb"}, {0xd0, 0x10a, 0x80, "28bce377582d6f775930349f8908437792a223879d421ebfdf2a8621f1da45bffc8c5b558ac1ab2d9f43e7ef0a3e4615f1cf5bb9bda1d6e07618d35cb4e5c44db64dddd247d5df99d433bf897d290bb25add49503671f1b857957f3c171bc13f564b6cb207913fc2c2fb975092399eb1e39ee1028a5f43162df9bebf075a569be911df1c13818fbbcb8632d4edcf8b636f8d0b36c0dc3dea531205149da73f1499031bdcee773c37dbf3647d14c233072e2f910a47740c125ccb931a5702a3"}], 0x14f0}}, {{&(0x7f0000003dc0)=@qipcrtr={0x2a, 0x3, 0x7fff}, 0x80, &(0x7f0000005180)=[{&(0x7f0000003e40)="e29ecb61fdbf8b0dc90bc30531373f90c6ff102d6f5044a9474f8e1719eb8703ad0438c04c41266d2fdcc0c8815058309c63192698bf8fb1cc4d4694d33f4d8b1ca6d3c7acf1be5d8a23", 0x4a}, {&(0x7f0000003ec0)="f43884483a1cc6942e3a8d75bcd10205e7e536be9ab617998065ea83bfecc436608fdabcb2fcbedf3692521e06eeeacc04b98b782382eee7cbdeff3729504f7f7661dab9f4dee8b47f50b6beae57aed0e27af87498921b", 0x57}, {&(0x7f0000003f40)="3b36288624898c675724cd29f9961acfe5a0", 0x12}, {&(0x7f0000003f80)="bd6e88", 0x3}, {&(0x7f0000003fc0)="52a056ec5b82bd30ed027bae0c9eeeef1ce6292d2361f6cc2c5d0b2bf53f22a2d290d3f8716c5a30cc2f2fdb50a5ec7536001fd445ae5ba98dbc8344241fd0c9d859472f162ef70a101e427fadf2e4c45543d195950e2cd35fc10e2f533b2540f0f21401d0fa602e01d2629d2a955c0707d494def8e85ccae95e70b2c5b0c74a60e28def274385ee05216eaddc35b2ac8e5f0bd6f503322cdf6d6d0f150c547cc163509e3e1eec89a50a433b7d604c6e77d7d5b5957d5d7b51ad841f32fb4b5979e7e7ffa5d9ab0f86e3a0e7bd79b43507f946153b5659685df0d988b9d96d5c186585f79d1096", 0xe7}, {&(0x7f00000040c0)="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", 0x1000}, {&(0x7f00000050c0)="8989d92cf1d1ba1b946ae1a94fd71d2e570564e595ba945f7cb50cf56bc41e3f6383bf28e4460c92bdbef8ad19ed8b2fb5c91836acb9d1c40360d513c6df07e0163fb93f7644355dc733ee0c9db3e1f3e149e8d9066b4955c5d3e797fad50279db037c039e263983d059ecd6ca25816a77f5afb80045ca67619685c6eca4c8c4363ca89c9e6dcbee9006e39b10ba45410c5b8a4f", 0x94}], 0x7, &(0x7f0000005200)=[{0x70, 0x116, 0x2, "f3e8c8a5380b61d6f86e7ea460c3cec1cfb375dfb99cf861fe5d2f8c9a2471a0f9f99769c324468ec97ee802b22567ed07b107331a54090a9ffef07c46a493cdf79c1c7146831079da214f483fb6c0c0b3e5f66e398a532dbb21d2fb"}, {0x68, 0x118, 0x9, "77f6de47f0b9e6e32336aa9975e20d71679bcb7e2b712954b8306db8f78b4a0ace25aa506ebace886624e23d732105959a865406652b9ff9bc6948a4fedd493c5fd51b3c45dc300ae4d9d1ef5ba81e6f28182b48adc9be4d"}], 0xd8}}, {{0x0, 0x0, &(0x7f0000005800)=[{&(0x7f0000005300)="3d842061efb3241508c3351468f42acc095c017a604efaf8481824ccb8b1cbe99020b05bb9cae0dcdcae0df89cfea25236b35eb7bcc61b69c0888c55bcb9d3cebd1b63d6067d9d72c88127f885906278594f1b68b530298e70d05b0700694c9ef8928eaf4dd1f862", 0x68}, {&(0x7f0000005380)="bae7aab674566332127a078251c20205792530317ae9dfece13309538e0512d3d441df1535d1341ddb4a0f1e7bb2a0304aa7ffd1142c90dcf05086dd8247b28c4107b7e8974c32eb854b042a2477f8abfb2e11aa68a067ec0fabef15eba1839f2692e7198b90494c586767efab2b8e367c51863c5b8700e5a07793e2d81ba884d3679320742cfd98d6db5744d2e3c4946eb2fde02c633a0392f9d59785e6eca57f470b6926fd9d00d56ee51ee8344827b8", 0xb1}, {&(0x7f0000005440)="70d99b1ac0730e67e88478cdeee4ef5d84bb54241030cd91bfe4bdc54db1dc74e687947b91a6c963cf4bb36ad53d96bf3e1812e036be9e787275415c2b74882e89b1dd1f74548bfa4f0fda4850b7b86a91685ff4243513bd9d2b37d8ed628348233f44f438f516183c96030e610475b4d1cd96d9ce122439116b356fc7bd09844e40330b164ac9b37f3e8061fffd1dde8bb124f2db4d7f1278a7b853853a9e21abbb92c0b5043407dd49dfe6b3ac3645c4bca9728c0e9b6b5c8f345197c2ae585f0fa0c3277ab6af2e62ec4fea6248f475e5db2ea0c24a8eb3", 0xd9}, {&(0x7f0000005540)="7066102d5dcda4f3771dcb112ab507fb3e0828e0ee9ecad6ce102446c0da9e1d13383f96b331cbc2aa25dd9fed719a6c09f647b3de0673226ec6d83906e140e11692e3cda6c11a2a3f4d76a9c2cac896963c0c849356afaca7d95492211dc59690a9a8fffcc23874d0e9e3b48036", 0x6e}, {&(0x7f00000055c0)="209f5438e5b35780c24f83436733a6000282a2fab218bbaeef16f09a4c382f74eb05d57ed79efcb1ff117fd8c52359cb1ad84371ec316de04baf970192932df4571f81de9d5c9cc0467457234f9a88616949bbd71e3fd43fac46e2861958733a2ff012770feda53bbd8685c9df4f590ce4ddb02ea4a98ba595612a716e62099376d8e42a932c7c0d36993261ce9236f6ea335c2006c2cb7e279fcdd565542875284fa77a8fb9293f7c48f0892361022950b29180568bd981be2510e84479c4affa51ca27fc", 0xc5}, {&(0x7f00000056c0)="121489cb7ca717bd9032a33adeeb149901a8b054ae661448a9b358f9a459f0059791498c865e3749941d", 0x2a}, {&(0x7f0000005700)="5a42a67c71d9790ec245de9b12cffc99c30ee3b608cbe8c95d632957f9102ed40073ca8f2a3708bb35228bf05f075d4fd629eb7b80d5d5571185e05060ec5d13532fa37b63e1cb8b2ff89662d9165c84cc672b7ec3220c43efbea27c86a833bbbcd1f14c40c366fe98eb3f1ad3db243613630a536ae30dbdf146d5bd771452bb04269a51d5c31ccdeeb15d8298ae7ec57e779dc9cf7395a7de29c69cfa26255d9f42c6d7ea1871e22f923314c9bf0e45f89d19fe3a17748eb9d9631449fb620d506f2d7383253a690a15ae609676", 0xce}], 0x7, &(0x7f0000005880)=[{0x98, 0x116, 0x1, "5e53b0d9c7c0a59ee0c142ecb7cb92790684a888150c8cd7e4905b793b1cd67a58d710269d97d10ed1a8bcfe93829d3f72750bd7b2a42952cbc332b4172bd57d1d32c500c85c6e34c155f53c83356759710ad816a1f66f3aa3c93019489d4cb46ebd05c8777915766224429f9deda8c2edd5f4420cc0fa09f70e85fe9022bfa13f61d6d994f89d"}], 0x98}}], 0x4, 0x8040) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x2}]}, 0x24}}, 0x0) 07:51:39 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000018009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:39 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0xffffffea, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) [ 2177.213919][T24025] device macvlan0 entered promiscuous mode [ 2177.235454][T24025] device macvlan0 left promiscuous mode 07:51:39 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000a00000000000000", 0x32) 07:51:39 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000507000000000000007800000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x2}]}, 0x24}}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='maps\x00') lseek(r1, 0x200, 0x0) read$char_usb(r1, &(0x7f0000000200)=""/106, 0x6a) syncfs(r0) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f00000000c0)={r0, 0x1, 0x0, 0x98d}) read$char_usb(r2, &(0x7f0000000300)=""/55, 0x37) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r1, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="24010000", @ANYRES16=0x0, @ANYBLOB="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"], 0x124}, 0x1, 0x0, 0x0, 0x8000}, 0x48000) 07:51:39 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000025009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:39 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0xffffffef, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:39 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000b00000000000000", 0x32) 07:51:39 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000048009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x7ff}]}, 0x24}}, 0x0) [ 2177.450318][T24248] device macvlan0 entered promiscuous mode [ 2177.465465][T24248] device macvlan0 left promiscuous mode 07:51:39 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000c00000000000000", 0x32) 07:51:39 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000507000000000000007900000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:39 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0xfffffff0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:39 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a0000000000000500000000004c009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:39 executing program 0: write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000080)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000040)=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x1}}, 0x20) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000e006060711f83f180384cf471c75010000000000000000000000400000000200"/46], 0x24}}, 0x0) 07:51:39 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000d00000000000000", 0x32) [ 2177.652257][T24467] device macvlan0 entered promiscuous mode [ 2177.666670][T24467] device macvlan0 left promiscuous mode 07:51:39 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000068009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:39 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0xfffffffe, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:39 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000e00000000000000", 0x32) 07:51:39 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000507000000000000007a00000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:39 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='maps\x00') lseek(r0, 0x200, 0x0) read$char_usb(r0, &(0x7f0000000200)=""/106, 0x6a) r1 = socket$inet(0xa, 0x80805, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000280)=ANY=[@ANYBLOB="01000000903a88711cd7a99c7170dd61bd20068317a4cb594453fd7c9981236ea1b52e7cae7d0524fca04e133e8f87f1b00fc44bb9ec0d4cb0377552aebbac645927be923dde020000000000000063fffec68d54e4d1e739a1bffd80cba1cf5ab1652df24654", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000001c0)={r3, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x9c) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000200)={r3, 0x2, 0x20, 0xd568, 0x352}, &(0x7f0000000240)=0x18) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f0000000300)=ANY=[@ANYBLOB="270000000206820f000000000000000001000004100003006269746d61703a706f72740005000400030000000500e6ff0700000005000100070000000500050005000000b37b13fa7d1086c63237ef12314cdde69aa0cec7a1b2e9"], 0x44}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$IPSET_CMD_LIST(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {}, [@IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x7}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x902d}]}, 0x24}}, 0x4000000) 07:51:39 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a0000000000000500000000006c009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:39 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000f00000000000000", 0x32) 07:51:39 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0xf, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="240000000706071c00000000000000000000000005000100070000000800064000000002"], 0x24}}, 0x0) [ 2177.864954][T24692] device macvlan0 entered promiscuous mode [ 2177.877087][T24692] device macvlan0 left promiscuous mode 07:51:40 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="400000001000050700000000000000a500000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:40 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000074009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:40 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000001000000000000000", 0x32) 07:51:40 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x10, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:40 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a08010000180a01030000000000000000000000090c000540000000000000000108000740000000010900020073797a31000000007400038068000380140001006970365f767469300000000000000000140001006d5363766c616e3000000000000000001400010076657468315f746f5f626f6e6400000014000100626174616476300000000000000000001400010076657468315f746f5f6873720000000008000240ffffffc108000740000000005800038018000380140001006261746164763000000000000000000008000240000001b32c000380140001006c6f00000000000000000000000000001400010076657468315f746f5f687372000000000800024000000009d4000000080a01080000000000000000070000010800094000000002b7000740de10c5f198e746a20169458d0900000000000000d9406399b755f85004a9bf9eb3e07541cf2e2bfe96f4bfaac64365071f59741c1019440d056a583ca761e0bd167169c8ab2c48669f0742e5a638e698759d3802c8b23fa8a26b4bd726b77a646c8380b9f5503823e6671ac84c09e4bfe06af7ab9676f833694a1ee6151299a69d9d4e021a777c1539a55f7036edd5ed5e09c5b002ce5b131b106ff35c5471723d9885923619b200e3df9c4ca9c2333715d3690020000000120a010400000000000000000c0000040900010073797a3100000000140000001100010000000000000000000000000a"], 0x224}, 0x1, 0x0, 0x0, 0x40000}, 0x880) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x2}]}, 0x24}}, 0x0) 07:51:40 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a0000000000000500000000007a009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:40 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000001100000000000000", 0x32) [ 2178.065386][T24909] device macvlan0 entered promiscuous mode [ 2178.079882][T24909] device macvlan0 left promiscuous mode 07:51:40 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a0000000000000500000000008a009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:40 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="24000000077e9e7be4b1c413c13cc35a2f4832970600010007000000083f064000000002"], 0x24}}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='maps\x00') ftruncate(0xffffffffffffffff, 0x9) lseek(r1, 0x200, 0x0) read$char_usb(r1, &(0x7f0000000200)=""/128, 0xfe97) sendmsg$NL80211_CMD_GET_PROTOCOL_FEATURES(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x0, 0x70bd2d, 0x25dfdbff, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4c000}, 0x2000c004) 07:51:40 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x25, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:40 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="400000001000050700000000000000a600000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:40 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000001200000000000000", 0x32) 07:51:40 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a000000000000050000000000e5019500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:40 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:40 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a0000000000000500000000001a029500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 2178.315293][T25231] device macvlan0 entered promiscuous mode [ 2178.341683][T25231] device macvlan0 left promiscuous mode 07:51:40 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000001300000000000000", 0x32) [ 2178.376458][T25232] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2178.407239][T25244] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.4'. 07:51:40 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000039500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:40 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="400000001000050700000000000000b000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:40 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0xc0, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) [ 2178.456946][T25344] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 2178.465141][T25344] netlink: 'syz-executor.0': attribute type 6 has an invalid length. 07:51:40 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000001400000000000000", 0x32) 07:51:40 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:40 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a000000000000050000000000bc039500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:40 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0xec0, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) [ 2178.595995][T25452] device macvlan0 entered promiscuous mode [ 2178.634765][T25452] device macvlan0 left promiscuous mode 07:51:40 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000059500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:40 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000001500000000000000", 0x32) [ 2178.656317][T25462] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 2178.664458][T25462] netlink: 'syz-executor.0': attribute type 6 has an invalid length. 07:51:40 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000069500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:40 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:40 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="400000001000050700000000000000de00000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:40 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000001600000000000000", 0x32) 07:51:40 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x33fe0, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:40 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000079500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 2178.861232][T25581] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 2178.869423][T25581] netlink: 'syz-executor.0': attribute type 6 has an invalid length. [ 2178.884608][T25582] device macvlan0 entered promiscuous mode [ 2178.901772][T25582] device macvlan0 left promiscuous mode 07:51:41 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x200005e4, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:41 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000001700000000000000", 0x32) 07:51:41 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000099500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:41 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) socket$nl_netfilter(0x10, 0x3, 0xc) 07:51:41 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="400000001000050700000000000000e900000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:41 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a000000000000050000000000000a9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:41 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000001800000000000000", 0x32) 07:51:41 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x7ffff000, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:41 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a000000000000050000000000000b9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 2179.117989][T25806] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 2179.126191][T25806] netlink: 'syz-executor.0': attribute type 6 has an invalid length. [ 2179.156435][T25809] device macvlan0 entered promiscuous mode 07:51:41 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a000000000000050000000000000c9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:41 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000001900000000000000", 0x32) [ 2179.201398][T25809] device macvlan0 left promiscuous mode 07:51:41 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) socket$nl_netfilter(0x10, 0x3, 0xc) 07:51:41 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0xfffffdef, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:41 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a000000000000050000000000000d9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:41 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="400000001000050700000000000000f000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:41 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000001a00000000000000", 0x32) [ 2179.349060][T26025] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 2179.357246][T26025] netlink: 'syz-executor.0': attribute type 6 has an invalid length. 07:51:41 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a000000000000050000000000000e9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:41 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x2, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:41 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) socket$nl_netfilter(0x10, 0x3, 0xc) [ 2179.419372][T26039] device macvlan0 entered promiscuous mode [ 2179.444324][T26039] device macvlan0 left promiscuous mode 07:51:41 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000119500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:41 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000001b00000000000000", 0x32) [ 2179.553540][T26207] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2 sclass=netlink_route_socket pid=26207 comm=syz-executor.4 07:51:41 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000507000000000000000201000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:41 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:41 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000001c00000000000000", 0x32) 07:51:41 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000129500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 2179.605505][T26248] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2 sclass=netlink_route_socket pid=26248 comm=syz-executor.4 07:51:41 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x8, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) [ 2179.693101][T26255] device macvlan0 entered promiscuous mode [ 2179.710490][T26255] device macvlan0 left promiscuous mode 07:51:41 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:41 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000001d00000000000000", 0x32) 07:51:41 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000189500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:41 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000507000000000000000c01000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) [ 2179.794501][T26263] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8 sclass=netlink_route_socket pid=26263 comm=syz-executor.4 [ 2179.823292][T26365] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8 sclass=netlink_route_socket pid=26365 comm=syz-executor.4 07:51:41 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0xa, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:41 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a000000000000050000000000021a9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:41 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000001e00000000000000", 0x32) 07:51:41 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="394a0f7c390cb429aba027ac14d54d6300000064232f6b7eb23f4fce334c9042b6d27fa16b115dceb4a0aaae6a06ec66f193bc712b38c48008ab7018efe0d161720c98fa1d03782adfee5ef046c63c7492a5d996fca4121f433753854208cb684d539d552d4cf711dd2f871be05dd0f2afd2f70dd2d9e27f5e34a88cd5af7d0e9bf75551d3e78d661cd0e4b69850ae0bb172e7d45192f0ff539af8ec51460983a165b7b55662a7fa3f6f313eaa3760aa2c505396bb59a055ee885973ba3d769377a387b966a8d5f88fe61a6ffb974de7500a9bd1735d802bf29f532575e583af79ad4c3dfb5c5c0033d961b0b71c992a9154d0a85dbf6b2e0bd133ad3ea512ca4cb2", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) [ 2179.943194][T26375] device macvlan0 entered promiscuous mode [ 2179.956613][T26375] device macvlan0 left promiscuous mode 07:51:42 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000002100000000000000", 0x32) 07:51:42 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000209500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:42 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:42 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000507000000000000001201000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) [ 2180.060167][T26485] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=10 sclass=netlink_route_socket pid=26485 comm=syz-executor.4 [ 2180.097698][T26489] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=10 sclass=netlink_route_socket pid=26489 comm=syz-executor.4 07:51:42 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000002200000000000000", 0x32) 07:51:42 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0xc, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:42 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000259500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:42 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:42 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000002300000000000000", 0x32) [ 2180.215986][T26497] device macvlan0 entered promiscuous mode [ 2180.234360][T26497] device macvlan0 left promiscuous mode 07:51:42 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000409500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:42 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000507000000000000003b01000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:42 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:42 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000002400000000000000", 0x32) 07:51:42 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000489500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 2180.335499][T26508] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12 sclass=netlink_route_socket pid=26508 comm=syz-executor.4 [ 2180.367719][T26609] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12 sclass=netlink_route_socket pid=26609 comm=syz-executor.4 07:51:42 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x77, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:42 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000002500000000000000", 0x32) 07:51:42 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a000000000000050000000000004c9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:42 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) [ 2180.465750][T26618] device macvlan0 entered promiscuous mode [ 2180.491589][T26618] device macvlan0 left promiscuous mode 07:51:42 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000002600000000000000", 0x32) 07:51:42 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000689500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:42 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000507000000000000007e01000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) [ 2180.564286][T26622] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=119 sclass=netlink_route_socket pid=26622 comm=syz-executor.4 07:51:42 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:42 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x402, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) [ 2180.628672][T26730] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=119 sclass=netlink_route_socket pid=26730 comm=syz-executor.4 07:51:42 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000002700000000000000", 0x32) 07:51:42 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a000000000000050000000000006c9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:42 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) [ 2180.719472][T26737] device macvlan0 entered promiscuous mode [ 2180.742201][T26737] device macvlan0 left promiscuous mode 07:51:42 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000002800000000000000", 0x32) 07:51:42 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000507000000000000000102000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:42 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x405, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:42 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000749500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:42 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r4, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r4, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r4, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r4, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:42 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000002900000000000000", 0x32) 07:51:43 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a000000000000050000000000007a9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 2180.917451][T26856] device macvlan0 entered promiscuous mode [ 2180.943290][T26856] device macvlan0 left promiscuous mode 07:51:43 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r4, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r4, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r4, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r4, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:43 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x406, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:43 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000002a00000000000000", 0x32) 07:51:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000507000000000000009802000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:43 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a000000000000050000000000008a9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:43 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000002b00000000000000", 0x32) 07:51:43 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r4, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r4, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="394a0f7c390cb429aba027ac14d54d6300000064232f6b7eb23f4fce334c9042b6d27fa16b115dceb4a0aaae6a06ec66f193bc712b38c48008ab7018efe0d161720c98fa1d03782adfee5ef046c63c7492a5d996fca4121f433753854208cb684d539d552d4cf711dd2f871be05dd0f2afd2f70dd2d9e27f5e34a88cd5af7d0e9bf75551d3e78d661cd0e4b69850ae0bb172e7d45192f0ff539af8ec51460983a165b7b55662a7fa3f6f313eaa3760aa2c505396bb59a055ee885973ba3d769377a387b966a8d5f88fe61a6ffb974de7500a9bd1735d802bf29f532575e583af79ad4c3dfb5c5c0033d961b0b71c992a9154d0a85dbf6b2e0bd133ad3ea512ca4cb2", @ANYRES16=r4, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r4, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:43 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000003bc9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:43 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x408, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:43 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000002c00000000000000", 0x32) [ 2181.182791][T26980] device macvlan0 entered promiscuous mode [ 2181.209112][T26980] device macvlan0 left promiscuous mode 07:51:43 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:43 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000001e59500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="400000001000050700000000000000a802000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:43 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000002d00000000000000", 0x32) 07:51:43 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x409, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:43 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000ff9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:43 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:43 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000002e00000000000000", 0x32) [ 2181.427911][T27104] device macvlan0 entered promiscuous mode [ 2181.442734][T27104] device macvlan0 left promiscuous mode 07:51:43 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000029500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:43 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:43 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x40a, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000507000000000000000003000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:43 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000002f00000000000000", 0x32) 07:51:43 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000039500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:43 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, 0x0, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, 0x0, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:43 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000049500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:43 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000003000000000000000", 0x32) 07:51:43 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x40b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) [ 2181.661619][T27229] device macvlan0 entered promiscuous mode [ 2181.678351][T27229] device macvlan0 left promiscuous mode 07:51:43 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, 0x0, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, 0x0, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000507000000000000000e03000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:43 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000059500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:43 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000003100000000000000", 0x32) 07:51:43 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x410, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:43 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, 0x0, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, 0x0, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:43 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000069500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:43 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000006000000000000000", 0x32) [ 2181.884717][T27354] device macvlan0 entered promiscuous mode [ 2181.901612][T27354] device macvlan0 left promiscuous mode 07:51:44 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000507000000000000003203000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:44 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r4, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r4, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r4, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r4, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r4, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:44 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000079500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:44 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x411, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:44 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000007c00000000000000", 0x32) 07:51:44 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000089500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:44 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r4, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r4, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r4, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r4, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r4, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) [ 2182.092561][T27473] device macvlan0 entered promiscuous mode [ 2182.109315][T27473] device macvlan0 left promiscuous mode 07:51:44 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000003000000000000", 0x32) 07:51:44 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:44 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000507000000000000003503000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:44 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000099500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:44 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r4, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r4, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r4, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r4, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r4, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:44 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {r2, r3}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0}, {0x0, 0x0}, {}, {r1, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, r3}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {}, {}, {0x0, r3}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000059240)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000051900)={0x9, [{}, {r159}, {r18, r12}, {}, {0x0, r162}, {}, {}, {}, {0x0, r12}, {}, {r4}, {}, {0x0, r91}, {r166}, {r130, r10}, {}, {r108, r128}, {}, {r86, r146}, {r96}, {r164, r107}, {r28, r167}, {r27}, {}, {}, {0x0, r161}, {}, {0x0, r139}, {}, {r145}, {}, {}, {}, {}, {}, {r21}, {0x0, r155}, {0x0, r3}, {r83, r68}, {r72}, {}, {0x0, r19}, {}, {r46}, {r33, r98}, {}, {0x0, r162}, {0x0, r117}, {r26}, {r41, r32}, {}, {}, {r2, r84}, {r102, r95}, {r85}, {r147}, {}, {r120}, {r173}, {}, {r63, r57}, {}, {r29}, {}, {}, {}, {r121}, {}, {r34, r133}, {r61, r13}, {0x0, r170}, {r36, r105}, {0x0, r16}, {}, {}, {}, {0x0, r69}, {0x0, r123}, {r42, r50}, {0x0, r100}, {0x0, r7}, {}, {0x0, r163}, {}, {r144, r97}, {}, {r129}, {0x0, r88}, {r31, r155}, {r76}, {}, {r160, r19}, {r115, r71}, {r23}, {0x0, r64}, {}, {r120, r54}, {r58, r139}, {r152}, {0x0, r149}, {}, {r78}, {r83}, {0x0, r40}, {}, {r46}, {r175}, {r14}, {r141}, {r9}, {}, {r150}, {}, {r24, r56}, {}, {r154}, {}, {r168}, {r55, r177}, {0x0, r19}, {0x0, r142}, {}, {r120}, {r70, r49}, {}, {0x0, r22}, {r110}, {}, {0x0, r52}, {}, {}, {}, {0x0, r136}, {}, {r99, r135}, {0x0, r51}, {}, {0x0, r95}, {r17}, {0x0, r111}, {}, {0x0, r73}, {}, {0x0, r165}, {}, {}, {0x0, r148}, {}, {}, {r42}, {0x0, r44}, {r1, r79}, {r143, r69}, {r30}, {0x0, r172}, {0x0, r32}, {}, {}, {0x0, r119}, {}, {}, {0x0, r151}, {r82}, {}, {r137}, {r11}, {r47}, {}, {r62}, {}, {r156}, {0x0, r123}, {0x0, r132}, {r60, r5}, {}, {}, {}, {r9, r35}, {0x0, r151}, {}, {r158, r170}, {r174, r73}, {}, {0x0, r157}, {0x0, r87}, {r67}, {r11, r90}, {0x0, r8}, {r45}, {0x0, r93}, {r101, r134}, {}, {}, {r18, r112}, {r143}, {}, {r106, r116}, {r131}, {}, {r118, r132}, {}, {r75, r37}, {r81, r138}, {r108}, {r171}, {}, {0x0, r92}, {r15, r59}, {}, {r127}, {r48, r163}, {}, {r169}, {}, {r124}, {}, {0x0, r140}, {r125, r25}, {}, {0x0, r74}, {r158}, {r94, r104}, {}, {}, {}, {}, {0x0, r114}, {0x0, r111}, {r6}, {r103, r66}, {}, {r153}, {r39}, {}, {r176, r146}, {r43}, {r58}, {}, {0x0, r113}, {}, {0x0, r80}, {}, {0x0, r5}, {0x0, r20}, {r89}, {r65, r122}, {r39}, {0x0, r126}, {r70, r53}, {r38}, {}, {}, {0x0, r109}, {}, {0x0, r77}], 0x0, "db419749633f79"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000052b40)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r178}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r178}], 0x0, "2b1d4b947586fc"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000052740)={0x0, 0x0, "f6201756759bf94cf5824a60ad4bd15e23254a03ccb344d3ffec7862fae39192a3f5fd890cda2983352c04098da4f42b5449f321d96133217c33cf6a0e17d41bc2e8f5fa9b3226ae2102cad34cce753f6fab3c42bab08d16cf914086d49eb6f5f9a5dce8f28c8c0724309fe9c1bab60909c411995472266291eac590df47b10ff42fe2ed808649ebed319cb95b6e75e785e8798f1b0154b3c25b01608f3e9d6b38d581a8cdda638b748c4d077151e83abe36603b5b08613307e630c92caa29b3ba8f3c89438921cb650035e2ff86fb76a631f2e90bb71811a7061ec92ffcfbb36ef2167c50e0d5c378d9ccb9f07d3f8e44bcf49f35da96e66590b4ff8eadb31f", "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"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000053740)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000054740)={0x0, 0x0, "989075bcdd23385a095231b9d600614c0e2829e68a0c5ea8addcca4f30570c2b69f2a3684226b4ae632b41116b281f2dc5826b73f228e295286ddb80cb048c2d84c363dee293ad5559d3dad8c339ae996124d462df80a333c07cdd1d0224bdb17aa214e410f1a7055c8e3fea95ab09ffd7a792176b117b6e2e98eb6aa884879f4a8adf2d0993fff9717ac3044751af2cb3159f16565fb995c394a8f1d8a1d321db743f076c76fd71c3761e1fc6239556d1ddf17332040027ed8fbbad893d87d60044698c6390d280624ef85e234d4f90a2bfdc975ea8c853b77e4a1d36710c941106de1dd75d17c4452e54205cc43c078236e9727e46dd1c23517abed6a75daf", "667499064192bcdcea579805fb51d91e165feb4caf1cde182ec445df4929225f96d9b70f68b005ec776f3160247942fac3a7e55e0050cf879de4b2f3bb8303cdb83576d7a0f8a351330b2061c23d746f91ce846e8bb77bf08d76e3dcfc36649ab14a5583daf78b60a468f94911aa35dff50caaa3873435847587b73b7b95c6ca51f78d14df35812d8a3047dfffb62b3cab3b61b3eb2d18048a52af0f0a94d4b3dcb69774457c9dafc685d64070717d57f08d1357f8f95ce0ff344c4dd70a8c8bd49abcc940ff5d6339d7c50d66bd318c7d7fee4f18ffb2d6d10a8f623f0311f96e6a6403c6edc5e680bd8466f0ce6e0c932c4ecec909e35cbf1d55e8d2b8143e4a4bbecd7bcf809d5c066417c06514623dfb89dcff2ea35c5497c1b097fa25d1730bba1387eaf48002178e8a40275d58b76c261d1d6aed1e810eeffe1e9ab79c8c476c341cb6b183d693042bec321944d0c5743a0cbe499cb414a829fa52b3304db406df78dde935c68ed72fea24604a25bea8fd31b6c1db91fc7525b3034e9d221bc05806b27646f09ea7e501fd0139bc7ad9223d4c1102f98fbc7463c31a0a1f3fe8b60dbf07f0c8c40148702e6836925c5aca35c159bbb1eb4287ba13866267e13518b387384676ab3d4b257f9ca4f7e6152af7d8ebc80cbd5e6558f09c5e95117fe7c092c2b61d23babb1555a32850ce24fac65a96b6bf2291a641640e75780a29bf913f280323e3b3acb9afa987704e4be6ba0b8a2e27998e3b1705cea1c5cecd093f4d270180a1e7515256d6bd2f1cd30dcb063511b77324239c47067a2f1584ea634bbf0d7a454af78154832a1bd32488586d316f5a7df0b35bddc480b86accb5ccc99a33f44c1aa37bd371c9903900b6fb56f617f90c6d20590d84f624dccd11ae36a3394bc35c9a9ef5fe11450779c1a9d63a132aa291626804cbba6f33527a1be09e450d1af07fb2d832abd8a3ae746e88af9566aca0fd7fd5c91981e7e034c2c022fe24aa345331f0f37c6f1284bc4de90caece2de6b8e1eb49ee9c84fbf460790675f8539c5d1b832d4899f6c46a15d8974d09cc32c44fea087fdfe7436a7764095d3c95620218bfbbff038c6221b8ee2027376f318bb6463b7d222c178ce6186ec305eca7f4f948924c20b31de609f123f80c0f042755644f4528941f9afb90ecb5cf3cda14f10a539aa67de34df346a87f2bcf2e1daf9693cd75daa19f58d80b8d76be94b118703f027b4246cbe46f26efcbb5fdb19da0a4e4d44b4d88a0f0d7f82f8896ae48b6653c624afaea7b9b5424473ac27b3456928a59b13c96785a5910a72ece7e9482499b7fe46d5f38657d5259b543ead165098060df82265257be75243edb8b21df1feed72ae512eb839cb4fa9acfe8577f8e1597306b8b6fc32ffc4c7513e8b6e225056875a73841727b0004b5c80020368e4c8882add2291dc960120a15a3f2b7219bdc39b2782bd120ba487e1c1d159f2223e038a416a9f13496d374bb560a53ea326437570f64d1e17b816352ffe596a7275da09bde78cca8411bc6cb1a7cf88ca0134c8ee6f49147abd760e21b790080cca5d03d758c1b4acb62de7ce7cc581e031cc1c05cabe207322704faacb7e71105d0494b86190b71a691b2065007745dd401a859188ed5028e6b54ab32f54f309551e6345d363ba8cf6a923144d0b880ad5e7d3a9404a9c9b38e97e12a5b590201054b9a3928d398719f7459bfbd432f99ba61957e7d486fb782915e3599a5d644cba43b93498ebce77757346edd5591d31c11f11462a9d75a9fded87cec819c9539baf0c219dfb7881af4347ad953e166f036f61b5bd8b3300cb2089478bcd1a283bd6e74394ecf45657dd24e0d091b913565f4f2ffb5a002c4b92d9c42544186b75f2cb7886b46dace1ec06d8313de411e220ab1b6101ab20d4e8b1a0485786c8756b7054bfeef83413962fbdb34ff845807f1f563ad43823b936a322d08d64030344da67419a60d1fcef8f3f4493332b8ee2f54783d037db596d95bb457b98568204354a87b8ad1ca45699d3d49e9d712343428a4debad39f98afe1da6386f688ff1c926d0f373f722349fa9a9b5c7e434c177ea84ec264269c25f760622804e507e9356f54409f401840a7ecffe2398fc58fb72f9eb204213ad269c470e0ea8558a86a6ebbb97e886d5c6dfe361d1b79a61928279632113e5edf06e0e2d34145735c4873194ed76fe83e297498aaa8cc68cf59f8d503cae035652ace9b1eb3c1a0f164b62eb1ec78d7a1e47e675aaafc5e986e29046b4b8f961ee1a4115f67c4cbf434ce80702cbd22f17ed2262055a53acee3d66cb837025e57789bfd57e0bcfd1d9be7984316f7f6ea7486183b3a788743b2785695277171cdde8a9c7190d254cca821217e1f4481b0565341f7cdd2f70637e6f0276232ad61e29dbd168ea750aac044eeaa1cb21b7f7c39f966a2b7485bc77574415e436ccf00e1aba02dc78fd3318a1af454162cec2d6cbe3629ad3e1f780a71e3acf3eb4b36f61c94331fc422c5f2d86e1d96537ea321451d3f68c0edac13376e48166a97b8c70137236714e042fcc008d185981d9c490f7b8da3dbf1d990e2d1d069cd1dd7cf4add764d08fc19e8b4bc7b2215a3437f606f3bc4b3b4530d8e8950cb51538e651bfd9364ec21b14ee18d8540c311f8348578509dbae74f0d81b17ddfc5b76a3aa4c8a31214ae0731a6b21eb4d4ac6481b68f8d46b1ef1c50879a08d025922cc8c79ff29aa43fcc1dbe30634532df50f169de8fb3dd0583b83bd38c6dcf9cb5dbccad7f2389fd5235d573689c94a93c169d416e9599450d6e8771e6b01c4ead840f3997d605efd0e11b82612c3c60c44915de591bf7e34b6e8d97aaeaf088a18425449e49f093c8f49543adf15c88887fe0f4a76754ecc7a4adab0db545345906a73ba63e85525abc4a77e06b6064325323807a707f928990be242f6eaa8f7dfe711361958c10602ed18211e9a97509d6b1846c3bddbf2cb79bb9deb5f47e68b3604bf5946c1d230fc70d11be27be52c48237763a7e15484880f2cbe31fcaf1da07c7bec3fa035a695b5820651def2b02e54d950ce26ea6dd347192531aff7bff9f69512e3715a64b017313df7209119423719b51321368d1890abffa6413836250d0a25ba711d304296791af5f4e6edbfb2153b9f26cd3beee0d76c7f30d443a6e7dfe6bb3342ca5b19e68dc9b91d5c6c04ab11e1ab767267743f3d2f91aea61bba6b1ade89f056cedaddc2b9a46dce27cf3169650277ab91bf7755b533f2645956e9bf7111530b64eca5e2935c16d526d49f3ee9a4cc7cffda9bb4d3a6046ddf450480a43b01da385133b5c5ad7fb3b349bc09fb5051bd2117d75fc34df6b266be4a4305ea2b20425b84f3134979fadd19fb3b58119305b7d0f247c56df8654fca59f8b1ac111095052786401bb130056956b99b5d4943d3a2cc1ee83f5bf76e05b9a9d08fb565b99af93a7f75d7edb6fdb2e04e38b2334d4523e6433016e2c91b6d68872e361495e0f4a830c5c4709daa16d5d42f71e55b5a6475666c98813a49f336768fa9e7a700dc24b73578efbcafbc3b05bcf84b440b96e8d6fc75a9c65b2e4565de6d52656da8925b14a0b533f4a598eb26b5840407a1aacc75021a890fc16a093a35d4f2d84930a059055c3870404353d1f83b827347a7a78e2467d8c0420f8de6b2ee3515fd5f7adffaa5cbc4d6c3fed8e1faa3b2ffd2be4fc5c217fd3e5b1327ef9b015bf6ed285bc5f4b1b124cf81d25465fb0336d95658d9e47e977de3807dbd57bd25e7a84e18833a9d477151e1ea351d02d7fc022f37fba8514b72bf8aa160265bf4c156b638dcc71fa4c97775d34b3f214776588265f11df26646f9b21069aea41e611662386c6f16408f0559dbb2ce13c2af3694dfd374fd0986467609c607aadd60b644692cc6d603aab16d50ed7d3eb0360dc4aef572e651b29fbc6011b86285499e196815c7d0e01031669c6b75e3016d5ee3834ac5c23e2a5019f867081a8d12979fa362b1dcae3b6090d66614c5da34b861749cbc4408670b86969c534569011160b4da906c73d233ab04691a5264431cf12986065026dfa54dff3fb0d57175b9871c0ded814966936d9ac3715a88b1bc211ab02f5bab7095e0d4edc95290e5da257d3df0b90dc667985cfabd3248eabb5e4276627fa1c8159cf3b47d7e368db1afaefbbef21d556e0fdc5e814e23549494acfb437559e7df51a0f39d8aa64a9991fc50de27fd919f0b5526118f965626746a9dac29603930b16afc47c33b48ef42461fe8de53b32193cf4d99ba66fc48e5a0509acc9fbd8b4112c6971837eaa583ac9cac609931f0c87e936f0d967b9cde205aeed33e58a75facb10166e7a99e14a803d87fd913fe7f8bddb2527ef288f438249d0bcfd4a1e04ace1d25a1feebfdea64495bf0436cb88ee1e05eec51d81dd66ea0fb9ab948021856ce880af6ae2191deb9fb05bfbadc037333c8772c422e893696fd52b37fcd937fc649a3b962052676e89fabfec467d900603c9a388d5859d516b10b1d444e4b4b2fd32fa8559b48f832275665c6fe8efe58206e093c01657103ac30686895ef776fed45108ce06aa1acf4aa2969a1b606ee90c18f90e26be0cf6595d1221cc8ace347774e943ef7953af3aac21b1ae687ff1fcf4d78173dfe713441033dc2f3e5a99e8bbda271b267603f9607335e9c41e7ee8e906d1b74ba8f12a782f411322d377d6eacddc53a8f612f5243b273126ad4c4061e3e7df82cf0e1f62f9a084593889fb33546e2210f0aa0a6813202cdb80cdd5bbfc38ae35d5aab0e9fffccda375465a88a6b40239e3f910bcc2fe47d9e49dff569da217c57a0f81555d9b3430b8dc0db0ecbe5914b033528b3445633b835907e6c2ad6a1e2baf0f6a7756b043c55d93dbba94222ea418a933ec858b7659d94264c997f114f5868f70bb3b62e3fc3d9a62790581f53025d12d3c5f36950d1e89ef131a7a08a0d5865401a4e8f7f697f769bb51e206ca9dd3c0d797f0785df3c22329ce6b55a14dcbbb06f0ecf63f625ad80ed2712ece08e89af031a118533cce310525f7cf5ecca276568d44229dc9e392822696c52d27cb4369e494753accdd395213862e6b8d15892f51d6f5a3e100cf550848de0fb44a517b35945df5def9c0c2af732bbcbaa5e31c254c964d034b8013370279fbdf3dd0f687e503934fad135588b9b02717de9a32bdc957ef52179838e822554c78a0c13d55590f56e0cb35402f41a2e56d319da938f1450dde79f6a6a054afb3ebb44636ff45ce48b322b15c97fb0d3d5dc43eb40d0af75fda88ac46e2b5dcb4a5e28b1d7b72962084b05e846198ea640550082a169633faa7591f0f6681e9929a95729b"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000052b40)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r182}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r182}], 0x0, "2b1d4b947586fc"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000052b40)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r183}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r183}], 0x0, "2b1d4b947586fc"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000055740)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000055940)={0xfff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r178}, {r179, r180}, {r181, r182}, {0x0, r183}, {0x0, r184}], 0xe0, "9c2f52bbec8119"}) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x2, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x54}}, 0x0) r185 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/udlfb', 0x4c0800, 0x141) sendmsg$NFQNL_MSG_CONFIG(r185, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="5400000002030500000000000000000007000007090002002e08000540000000010845d852b9da100340000000bc0904020000000007010000000800034000000ee4080005"], 0x54}, 0x1, 0x0, 0x0, 0x40884}, 0x40081) ioctl$BTRFS_IOC_INO_PATHS(r0, 0xc0389423, &(0x7f00000000c0)={0x0, 0x30, [0x0, 0x2, 0x7, 0x5], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 07:51:44 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000005000000000000", 0x32) 07:51:44 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:44 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a2c000000030a0102000000000000000005000012bbcbe3ff6d3ffa2d000900010073797a30000000000c0002800800024000000000140000001100010000000000000000000000000a"], 0x54}}, 0x0) r1 = socket$inet(0x10, 0x3, 0x0) write(r1, &(0x7f0000000340)="240000001e001f0214fffffffff807170000305000001c000000010008000f0002000000", 0x24) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r2) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000440)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_AUTHENTICATE(r2, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="080029bd7000fbdbdf252500000008000300", @ANYRES32=r4, @ANYBLOB="f6ff0500b6f3a1ce8e920000040028000800090001ac0f00040028000a003400010101010101000008002201d00100000812a00001000000080034003f4127cf0a4ce0e8f48fa47fbd5d0000dccaffccc8d87e4d77"], 0x68}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000008) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x2, 0x2e}}}}, ["", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4041000}, 0x8010) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r2) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x2c, r5, 0x10, 0x0, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x5}, @NL80211_ATTR_4ADDR={0x5, 0x53, 0x1}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x400c010}, 0x80) 07:51:44 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a000000000000050000000000000a9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:44 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="394a0f7c390cb429aba027ac14d54d6300000064232f6b7eb23f4fce334c9042b6d27fa16b115dceb4a0aaae6a06ec66f193bc712b38c48008ab7018efe0d161720c98fa1d03782adfee5ef046c63c7492a5d996fca4121f433753854208cb684d539d552d4cf711dd2f871be05dd0f2afd2f70dd2d9e27f5e34a88cd5af7d0e9bf75551d3e78d661cd0e4b69850ae0bb172e7d45192f0ff539af8ec51460983a165b7b55662a7fa3f6f313eaa3760aa2c505396bb59a055ee885973ba3d769377a387b966a8d5f88fe61a6ffb974de7500a9bd1735d802bf29f532575e583af79ad4c3dfb5c5c0033d961b0b71c992a9154d0a85dbf6b2e0bd133ad3ea512ca4cb2", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) [ 2182.346785][T27601] device macvlan0 entered promiscuous mode [ 2182.385719][T27601] device macvlan0 left promiscuous mode 07:51:44 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000006000000000000", 0x32) 07:51:44 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000507000000000000007403000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:44 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a000000000000050000000000000b9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:44 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x3, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) [ 2182.479573][T27712] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2182.517874][T27712] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 07:51:44 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={{0x14}, [@NFT_MSG_DELTABLE={0x34, 0x2, 0xa, 0x401, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_DELCHAIN={0x90, 0x5, 0xa, 0x201, 0x0, 0x0, {0x3, 0x0, 0x46}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}, @NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_COUNTERS={0x34, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x76}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x1}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x8}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x1}]}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}]}, @NFT_MSG_DELFLOWTABLE={0x14, 0x18, 0xa, 0x801, 0x0, 0x0, {0x5, 0x0, 0x4}}, @NFT_MSG_DELOBJ={0x7c, 0x14, 0xa, 0x3, 0x0, 0x0, {0x3, 0x0, 0x3}, [@NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x3}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x6}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x7}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x5}]}, @NFT_MSG_NEWCHAIN={0xec, 0x3, 0xa, 0x401, 0x0, 0x0, {0x0, 0x0, 0x4}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0x38, 0x4, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x2bb9b56e}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x4}, @NFTA_HOOK_DEV={0x14, 0x3, 'batadv_slave_0\x00'}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x4}]}, @NFTA_CHAIN_COUNTERS={0x34, 0x8, 0x0, 0x1, [@NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x9}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x1}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x1000}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x9}]}, @NFTA_CHAIN_COUNTERS={0x4c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x400}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x2}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x8001}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x8}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x4c7}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x800}]}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffe}]}, @NFT_MSG_NEWFLOWTABLE={0x30, 0x16, 0xa, 0x101, 0x0, 0x0, {0x4, 0x0, 0x6}, [@NFTA_FLOWTABLE_HOOK={0x1c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x3ff}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x20}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_NEWRULE={0x28, 0x6, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x3}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x3}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz1\x00'}]}], {0x14}}, 0x2c0}, 0x1, 0x0, 0x0, 0x20040040}, 0x810) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_DELFLOWTABLE={0x2c, 0x18, 0xa, 0x101, 0x0, 0x0, {0x2, 0x0, 0x2}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x54}}, 0x44851) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='maps\x00') lseek(r1, 0x200, 0x0) read$char_usb(r1, &(0x7f0000000200)=""/106, 0x6a) sendmsg$NFQNL_MSG_CONFIG(r1, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x40, 0x2, 0x3, 0x5, 0x0, 0x0, {0x0, 0x0, 0x3}, [@NFQA_CFG_FLAGS={0x8, 0x5, 0x1, 0x0, 0x18}, @NFQA_CFG_PARAMS={0x9, 0x2, {0x1f}}, @NFQA_CFG_CMD={0x8, 0x1, {0x2, 0x0, 0x2b}}, @NFQA_CFG_QUEUE_MAXLEN={0x8, 0x3, 0x1, 0x0, 0x7}, @NFQA_CFG_QUEUE_MAXLEN={0x8, 0x3, 0x1, 0x0, 0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000}, 0x20020040) 07:51:44 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:44 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000007000000000000", 0x32) 07:51:44 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x4, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:44 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x2, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x54}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000040)={&(0x7f0000000500)={{0x14}, [@NFT_MSG_NEWSET={0xd0, 0x9, 0xa, 0x900, 0x0, 0x0, {0x3, 0x0, 0x1}, [@NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_SET_USERDATA={0x42, 0xd, 0x1, 0x0, "c54ae33d0f552c62d2e2bd9f69efe877abf4a0652e326ff1ec31c36466b51a367e9abda55d1b704b9b64b47e1683251e9ff615c4179c93a41f57c735a85c"}, @NFTA_SET_DATA_LEN={0x8, 0x7, 0x1, 0x0, 0x35}, @NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0x59b}, @NFTA_SET_EXPR={0x44, 0x11, 0x0, 0x1, @objref={{0xb}, @val={0x34, 0x2, 0x0, 0x1, [@NFTA_OBJREF_SET_NAME={0x9, 0x4, 'syz0\x00'}, @NFTA_OBJREF_SET_SREG={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_OBJREF_IMM_TYPE={0x8, 0x1, 0x1, 0x0, 0x5}, @NFTA_OBJREF_SET_SREG={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_OBJREF_IMM_NAME={0x9, 0x2, 'syz1\x00'}]}}}, @NFTA_SET_OBJ_TYPE={0x8, 0xf, 0x1, 0x0, 0x9}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_OBJ_TYPE={0x8, 0xf, 0x1, 0x0, 0x2}]}, @NFT_MSG_NEWOBJ={0x20, 0x12, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0xa}, @NFT_OBJECT_CT_EXPECT=@NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}}, @NFT_MSG_NEWOBJ={0x20, 0x12, 0xa, 0x300, 0x0, 0x0, {0xc, 0x0, 0x7}, @NFT_OBJECT_CT_HELPER=@NFTA_OBJ_NAME={0x9, 0x2, 'syz1\x00'}}, @NFT_MSG_DELSET={0x128, 0xb, 0xa, 0x5, 0x0, 0x0, {0x7, 0x0, 0x3}, [@NFTA_SET_HANDLE={0xc, 0x10, 0x1, 0x0, 0x4}, @NFTA_SET_OBJ_TYPE={0x8, 0xf, 0x1, 0x0, 0x1}, @NFTA_SET_TIMEOUT={0xc, 0xb, 0x1, 0x0, 0xfffffffffffffffd}, @NFTA_SET_USERDATA={0xe5, 0xd, 0x1, 0x0, "e4016aee1ff1e361559ad65f2bdb2827f92c3751045e942b9403cc9aff9641c5766bb6e145d3dc5b949bbb6586022b8fe90b29492fc77799dd8734d1401cc763931d8b6e50c2df32072a7624eeb6e5589e0c1be2e8f1180e1dbeafa9ecf647a65805a28165cd1f41a099fce90149df868a5f3dae60a6c5c9bd5480c016065dfb98851f9d02179f0568f0395f69896bd8b467b9d4a81c381ead1d8975dbebf79bd3ffa75db810f2923b8a50019a70ebaa0010c6652ce8bef5448025ae4a57e146849801f18a79af60101c9a0fce6c7d9200d3759acd9305361b2076b9de12bef7d0"}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELOBJ={0x24, 0x14, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x2}, [@NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x6}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x9}]}, @NFT_MSG_NEWSET={0x2c, 0x9, 0xa, 0x3, 0x0, 0x0, {0xa, 0x0, 0x2}, [@NFTA_SET_EXPR={0x10, 0x11, 0x0, 0x1, @socket={{0xb}, @void}}, @NFTA_SET_DATA_TYPE={0x8}]}, @NFT_MSG_NEWOBJ={0x20, 0x12, 0xa, 0x5, 0x0, 0x0, {0xc, 0x0, 0x9}, @NFT_OBJECT_SYNPROXY=@NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x1}}], {0x14}}, 0x2d0}, 0x1, 0x0, 0x0, 0x4042}, 0x20000000) 07:51:44 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a000000000000050000000000000c9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 2182.598754][T27725] device macvlan0 entered promiscuous mode [ 2182.608060][T27725] device macvlan0 left promiscuous mode 07:51:44 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000507000000000000007603000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:44 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000009000000000000", 0x32) 07:51:44 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="394a0f7c390cb429aba027ac14d54d6300000064232f6b7eb23f4fce334c9042b6d27fa16b115dceb4a0aaae6a06ec66f193bc712b38c48008ab7018efe0d161720c98fa1d03782adfee5ef046c63c7492a5d996fca4121f433753854208cb684d539d552d4cf711dd2f871be05dd0f2afd2f70dd2d9e27f5e34a88cd5af7d0e9bf75551d3e78d661cd0e4b69850ae0bb172e7d45192f0ff539af8ec51460983a165b7b55662a7fa3f6f313eaa3760aa2c505396bb59a055ee885973ba3d769377a387b966a8d5f88fe61a6ffb974de7500a9bd1735d802bf29f532575e583af79ad4c3dfb5c5c0033d961b0b71c992a9154d0a85dbf6b2e0bd133ad3ea512ca4cb2", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:44 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0xa4, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x5}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x4c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, @IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x9}, @IPSET_ATTR_CIDR={0x5, 0x3, 0x1}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0xa6}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e23}, @IPSET_ATTR_SIZE={0x8, 0x17, 0x1, 0x0, 0x200}, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x3}]}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'list:set\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x7}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0xa4}, 0x1, 0x0, 0x0, 0x4000011}, 0x4004) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x2, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x54}}, 0x0) 07:51:44 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a000000000000050000000000000d9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:44 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x5, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:44 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00000000000a000000000000", 0x32) 07:51:44 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r4, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r4, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r4, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r4, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r4, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) [ 2182.795041][T27855] device macvlan0 entered promiscuous mode [ 2182.805724][T27855] device macvlan0 left promiscuous mode 07:51:44 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a000000000000050000000000000e9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:44 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000740)={0x0, 0x0, {0x0, @struct}, {0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="2400000002210b00000000000000f911c9c3e9d3541498a1e8ff1a000003000009050001c44e93d5ac25f358c557290680209cfc05ffffff7f1d579c07f91b0285cf7a310c0546fef5c8ac89cb68b9774b7513c7fa04f821f0ef8641ab0d8c83c956a3289e81e65b29f3cbbd8d7b246555b3fdc7721172bac60ed05073d3aeb6f35514c603244f5b82cb6785c6e7dd3e969f4578befeefa3161d"], 0x24}}, 0x80) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x54}, 0x1, 0x0, 0x0, 0x4000}, 0x0) 07:51:44 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="400000001000050700000000000000a803000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:44 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x6, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:44 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00000000000b000000000000", 0x32) 07:51:45 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r4, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r4, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r4, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="394a0f7c390cb429aba027ac14d54d6300000064232f6b7eb23f4fce334c9042b6d27fa16b115dceb4a0aaae6a06ec66f193bc712b38c48008ab7018efe0d161720c98fa1d03782adfee5ef046c63c7492a5d996fca4121f433753854208cb684d539d552d4cf711dd2f871be05dd0f2afd2f70dd2d9e27f5e34a88cd5af7d0e9bf75551d3e78d661cd0e4b69850ae0bb172e7d45192f0ff539af8ec51460983a165b7b55662a7fa3f6f313eaa3760aa2c505396bb59a055ee885973ba3d769377a387b966a8d5f88fe61a6ffb974de7500a9bd1735d802bf29f532575e583af79ad4c3dfb5c5c0033d961b0b71c992a9154d0a85dbf6b2e0bd133ad3ea512ca4cb2", @ANYRES16=r4, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r4, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:45 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000109500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:45 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={{0x14}, [], {0x14}}, 0x28}}, 0x0) 07:51:45 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x7, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:45 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00000000000c000000000000", 0x32) [ 2183.030263][T27980] device macvlan0 entered promiscuous mode [ 2183.037004][T27980] device macvlan0 left promiscuous mode 07:51:45 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r4, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r4, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r4, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="394a0f7c390cb429aba027ac14d54d6300000064232f6b7eb23f4fce334c9042b6d27fa16b115dceb4a0aaae6a06ec66f193bc712b38c48008ab7018efe0d161720c98fa1d03782adfee5ef046c63c7492a5d996fca4121f433753854208cb684d539d552d4cf711dd2f871be05dd0f2afd2f70dd2d9e27f5e34a88cd5af7d0e9bf75551d3e78d661cd0e4b69850ae0bb172e7d45192f0ff539af8ec51460983a165b7b55662a7fa3f6f313eaa3760aa2c505396bb59a055ee885973ba3d769377a387b966a8d5f88fe61a6ffb974de7500a9bd1735d802bf29f532575e583af79ad4c3dfb5c5c0033d961b0b71c992a9154d0a85dbf6b2e0bd133ad3ea512ca4cb2", @ANYRES16=r4, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r4, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:45 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="400000001000050700000000000000cc03000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:45 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000119500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:45 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00000000000d000000000000", 0x32) 07:51:45 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r4, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r4, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r4, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r4, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r4, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:45 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000129500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:45 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) [ 2183.253811][T28106] device macvlan0 entered promiscuous mode [ 2183.270511][T28106] device macvlan0 left promiscuous mode 07:51:45 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x2, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x54}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000980)='./file0\x00', 0x121000, 0x8) pipe(&(0x7f0000000d00)={0xffffffffffffffff}) openat$cgroup_devices(r2, &(0x7f0000000d40)='devices.allow\x00', 0x2, 0x0) r3 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x3c, r3, 0x100, 0x70bd2b, 0x0, {}, [@GTPA_FLOW={0x6}, @GTPA_I_TEI={0x8, 0x8, 0x1}, @GTPA_FLOW={0x6}, @GTPA_MS_ADDRESS={0x8, 0x5, @private=0xa010100}, @GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4085}, 0x4084) sendmsg$GTP_CMD_GETPDP(r1, &(0x7f0000000ac0)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000a80)={&(0x7f0000000a00)={0x58, r3, 0x100, 0x70bd25, 0x25dfdbfe, {}, [@GTPA_FLOW={0x6, 0x6, 0x3}, @GTPA_TID={0xc, 0x3, 0x4}, @GTPA_O_TEI={0x8, 0x9, 0x3}, @GTPA_PEER_ADDRESS={0x8, 0x4, @loopback}, @GTPA_MS_ADDRESS={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x29}}, @GTPA_TID={0xc, 0x3, 0x3}, @GTPA_TID={0xc, 0x3, 0xfffffffffffffff8}]}, 0x58}, 0x1, 0x0, 0x0, 0x8041}, 0x4808) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000500)={{0x14}, [@NFT_MSG_NEWRULE={0x1a4, 0x6, 0xa, 0x201, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_RULE_USERDATA={0x51, 0x7, 0x1, 0x0, "7c1f0d118626c05f7b6a53cf7d687a1e955b0443a22c6be5a53d81d915118645c566d1527abf622469a1dbcb97d4f4fca8b5716bda8eafe257e51b14d5d3019112d960ba6db6d20126f00ad91c"}, @NFTA_RULE_USERDATA={0x5e, 0x7, 0x1, 0x0, "75205314425e5821a65b1b0dd76272b19c79282f836812a50bb23cd26c49147665849d5f56f848275e34f0dee4456398075b732c8abe5c519cdad871f6c5ff54f8ef294f1594f1848900d3968192736a0a8d9e7d30f5d448dc66"}, @NFTA_RULE_USERDATA={0x90, 0x7, 0x1, 0x0, "5202409f9c916e3bed7cb9c4a77134ae7b626413de2840ab3b09945e356e80adbf30fa007b821a64a3b332890f9542fad98dcd7574f757289cea477b407fbeac2768e7b96b38aa32b7902a3d9d9c5fd3c650e1c5a7cee34e7e2ea869ef9e02e8d3adfb88551debb5ce5070ed5b7a9860b6e76de1bd12e42fc8d9cabbe6587748f79e27459725eeaf73d56907"}, @NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x3}, @NFTA_RULE_HANDLE={0xc, 0x3, 0x1, 0x0, 0x1}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_POSITION_ID={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_RULE_HANDLE={0xc, 0x3, 0x1, 0x0, 0x1}, @NFTA_RULE_HANDLE={0xc, 0x3, 0x1, 0x0, 0x5}]}, @NFT_MSG_DELSET={0x14, 0xb, 0xa, 0x3, 0x0, 0x0, {0x2, 0x0, 0x8}}, @NFT_MSG_DELRULE={0x20, 0x8, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x4}, [@NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x2}]}, @NFT_MSG_NEWCHAIN={0x48, 0x3, 0xa, 0x101, 0x0, 0x0, {0x7, 0x0, 0xa}, [@NFTA_CHAIN_COUNTERS={0x34, 0x8, 0x0, 0x1, [@NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0xfff}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x4}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x8}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x7}]}]}], {0x14}}, 0x248}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) 07:51:45 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00000000000e000000000000", 0x32) 07:51:45 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000507000000000000000005000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:45 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r4, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r4, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r4, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r4, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r4, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:45 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000189500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:45 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r0, 0x65, 0x5, &(0x7f0000000040)=0x1, 0x4) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x28, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_HOOK={0xc, 0x2, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x50}}, 0x0) 07:51:45 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x9, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) [ 2183.455485][T28228] device macvlan0 entered promiscuous mode [ 2183.468867][T28228] device macvlan0 left promiscuous mode [ 2183.487943][T28232] validate_nla: 46 callbacks suppressed [ 2183.487961][T28232] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 07:51:45 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000259500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 2183.501692][T28232] netlink: 'syz-executor.0': attribute type 6 has an invalid length. 07:51:45 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00000000c00e000000000000", 0x32) 07:51:45 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000507000000000000008f05000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:45 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000489500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:45 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r4, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r4, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r4, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="394a0f7c390cb429aba027ac14d54d6300000064232f6b7eb23f4fce334c9042b6d27fa16b115dceb4a0aaae6a06ec66f193bc712b38c48008ab7018efe0d161720c98fa1d03782adfee5ef046c63c7492a5d996fca4121f433753854208cb684d539d552d4cf711dd2f871be05dd0f2afd2f70dd2d9e27f5e34a88cd5af7d0e9bf75551d3e78d661cd0e4b69850ae0bb172e7d45192f0ff539af8ec51460983a165b7b55662a7fa3f6f313eaa3760aa2c505396bb59a055ee885973ba3d769377a387b966a8d5f88fe61a6ffb974de7500a9bd1735d802bf29f532575e583af79ad4c3dfb5c5c0033d961b0b71c992a9154d0a85dbf6b2e0bd133ad3ea512ca4cb2", @ANYRES16=r4, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r4, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:45 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0xa, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:45 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00000000000f000000000000", 0x32) 07:51:45 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='maps\x00') lseek(r0, 0x200, 0x0) read$char_usb(r0, &(0x7f0000000200)=""/106, 0x6a) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x68, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x68}}, 0x40408c4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@empty}}, &(0x7f00000001c0)=0xe8) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000500)={0x3f8, 0x0, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_FEATURES_WANTED={0x388, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0xae, 0x5, "dcf8b487999e451f2103333a1e8b8e793f4eb4b0d765c360b78829d1d9c9d9f6ed8414eb1b7ad990247b56ac1c8d1724d8d1a1a75e0ebe2fdf1a72c0a0e95a758a19017964cac0273b371b101e12cca88bfff2473ca0691cf100bebbfc06312945cd3ffaa341278ec74beb5672fadb8d454ede8c74edeb80809d7d47a55490f890567c983a4e5da58361b215a44404f26bfeb2259a38d20317232c6cd58927360d8d96db9c57d6003c37"}, @ETHTOOL_A_BITSET_VALUE={0xed, 0x4, "942498f2d1bd35cade5fb71b8f53a9de50078787762deffd2ab1d0e05cb8cdbe80b7c513a72134c4f75008968d04be394aa2f1ad06d205323ab5e97dea0e1602ba4bcd7336b7d75a4f05d6a0440d277a22065b7c3b676ba052438728efd6f3afa4e607461324300910a1b5cd5fb1c134e36932122bf8187c920384d128f9dd06b697eaaf80f57724252277ed8f81a70884222761e72c0794cfa8d7d6ebc3b4c6c7ab0a24db07223d596570b4fb2671b3c032a19687f1cb065d0e60f3cdd508e27372bbc077bf19850c3501ebc1d9a5acdf36a62281723a56087fd4859397b54940e5a91d8e3b2ebcca"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0xb4, 0x5, "3c5d5f1811ab6c8b731876d008de963db52736db1a1e17d725df90955d7c0c62dd11a51a9d2053f5c526615f6cad03a72295a77cd82b8084e00176eca018e4419cde5c94baf77ad82302e7d761ab18f1d7e251bc365161cc89d9a6f8fb3bd603d38ebd8d388ef57dba84f56cdbf7e47964a2b8be5b74d5e4e4beda317abf2fd7dc1c9b29f2fd716eddc51dd640f1e6d506f478965bf32e2bd85b906d3dfb1096afa744f482064afd07e10c72a6651af5"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}, @ETHTOOL_A_BITSET_VALUE={0xa3, 0x4, "8e4089a0b10274e279fb4b51838e86df39bda7cbf666875ed73a51503e0162e11d78d8fd7d7d81de05303fa21a707a3f746eee0d4062425f0de74f636af3e62230348b4f5214a7f2fbd13e3eecc235432bd0e165a32c570b4fadb301dfc1bc5e519018436c84b9a79304c3a65f2e12a42161f3d6a2fb97355aa1526aaac212825248ab1401a52ffec6b956e3199a190dee6d69d3ebea2b9693d2ae243e1e1b"}, @ETHTOOL_A_BITSET_VALUE={0x7b, 0x4, "755529231f0254b706af16ca2aadb1dec414bf05226db8aea73cbb549c4623226f836e1cf718a8b52a3a114d349616663e1ba00444740f00d2bfbedcf5eb08afc463cf2ae50332ab9643de401ebd29c94a50fe42b168a83450f9ce55f0e8301277c6c246c9f42b36e6f65aff4002be831b34870e7214c7"}]}, @ETHTOOL_A_FEATURES_HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}]}]}, 0x3f8}, 0x1, 0x0, 0x0, 0x4040000}, 0x800) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='maps\x00') lseek(r6, 0x200, 0x0) read$char_usb(r6, &(0x7f0000000200)=""/106, 0x6a) sendmsg$NFULNL_MSG_CONFIG(r6, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x4c, 0x1, 0x4, 0x201, 0x0, 0x0, {0x5, 0x0, 0xb}, [@NFULA_CFG_CMD={0x5, 0x1, 0x4}, @NFULA_CFG_FLAGS={0x6, 0x6, 0x1, 0x0, 0x1dbf62aef7302951}, @NFULA_CFG_FLAGS={0x6, 0x6, 0x1, 0x0, 0x5}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}, @NFULA_CFG_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x1}, @NFULA_CFG_FLAGS={0x6, 0x6, 0x1, 0x0, 0x1}, @NFULA_CFG_CMD={0x5, 0x1, 0x3}]}, 0x4c}, 0x1, 0x0, 0x0, 0x49840}, 0x20000594) sendmsg$NFT_BATCH(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x2, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x54}}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000440)={r2}) sendmsg$IPCTNL_MSG_CT_GET(r7, &(0x7f0000000a80)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000940)={0xd8, 0x1, 0x1, 0x101, 0x0, 0x0, {0xc, 0x0, 0x9}, [@CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x6}, @CTA_MARK_MASK={0x8, 0x15, 0x1, 0x0, 0x2}, @CTA_HELP={0x10, 0x5, 0x0, 0x1, {0xa, 0x1, 'H.245\x00'}}, @CTA_NAT_DST={0x9c, 0xd, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @multicast1}}, @CTA_NAT_PROTO={0x2c, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e24}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e22}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e21}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e22}]}, @CTA_NAT_PROTO={0x2c, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e21}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e21}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e23}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}]}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e22}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e21}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e21}]}, @CTA_NAT_V4_MINIP={0x8, 0x1, @remote}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x7fff}]}, 0xd8}, 0x1, 0x0, 0x0, 0x40000c0}, 0x80) [ 2183.668621][T28452] device macvlan0 entered promiscuous mode [ 2183.681512][T28452] device macvlan0 left promiscuous mode 07:51:45 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a000000000000050000000000004c9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:45 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x1f0}, 0x1, 0x0, 0x0, 0x40000}, 0x4044) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x2, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x80000000}]}]}], {0x14}}, 0x54}, 0x1, 0x0, 0x0, 0x20040000}, 0x0) 07:51:45 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0xb, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) [ 2183.718169][T28463] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 2183.726333][T28463] netlink: 'syz-executor.0': attribute type 6 has an invalid length. 07:51:45 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000011000000000000", 0x32) 07:51:45 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000507000000000000009d05000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:45 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:45 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000689500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:45 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='maps\x00') lseek(r0, 0x200, 0x0) read$char_usb(r0, &(0x7f0000000200)=""/106, 0x6a) getsockname$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x2, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x54}}, 0x0) 07:51:45 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0xc, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:45 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000012000000000000", 0x32) 07:51:46 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a000000000000050000000000006c9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:46 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) [ 2183.908117][T28583] device macvlan0 entered promiscuous mode [ 2183.917906][T28585] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 2183.926211][T28585] netlink: 'syz-executor.0': attribute type 6 has an invalid length. [ 2183.936366][T28583] device macvlan0 left promiscuous mode 07:51:46 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000013000000000000", 0x32) 07:51:46 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)={{0x14}, [@NFT_MSG_DELRULE={0x954, 0x8, 0xa, 0x301, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x354, 0x4, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@ct={{0x7}, @void}, @meta={{0x9}, @val={0x34, 0x2, 0x0, 0x1, [@NFTA_META_KEY={0x8, 0x2, 0x1, 0x0, 0x6}, @NFTA_META_KEY={0x8, 0x2, 0x1, 0x0, 0x15}, @NFTA_META_DREG={0x8, 0x1, 0x1, 0x0, 0xf}, @NFTA_META_DREG={0x8}, @NFTA_META_KEY={0x8, 0x2, 0x1, 0x0, 0x1b}, @NFTA_META_DREG={0x8, 0x1, 0x1, 0x0, 0xb}]}}]}, {0x164, 0x1, 0x0, 0x1, [@numgen={{0xb}, @void}, @fwd={{0x8}, @void}, @hash={{0x9}, @val={0x4c, 0x2, 0x0, 0x1, [@NFTA_HASH_SEED={0x8, 0x5, 0x1, 0x0, 0x2}, @NFTA_HASH_OFFSET={0x8, 0x6, 0x1, 0x0, 0x5}, @NFTA_HASH_LEN={0x8, 0x3, 0x1, 0x0, 0x3b}, @NFTA_HASH_MODULUS={0x8, 0x4, 0x1, 0x0, 0xfff}, @NFTA_HASH_OFFSET={0x8, 0x6, 0x1, 0x0, 0x7fffffff}, @NFTA_HASH_LEN={0x8, 0x3, 0x1, 0x0, 0xaa}, @NFTA_HASH_OFFSET={0x8, 0x6, 0x1, 0x0, 0x2}, @NFTA_HASH_OFFSET={0x8, 0x6, 0x1, 0x0, 0x2}, @NFTA_HASH_OFFSET={0x8, 0x6, 0x1, 0x0, 0xed60}]}}, @socket={{0xb}, @val={0x3c, 0x2, 0x0, 0x1, [@NFTA_SOCKET_DREG={0x8, 0x2, 0x1, 0x0, 0x9}, @NFTA_SOCKET_DREG={0x8, 0x2, 0x1, 0x0, 0x17}, @NFTA_SOCKET_KEY={0x8}, @NFTA_SOCKET_DREG={0x8, 0x2, 0x1, 0x0, 0x13}, @NFTA_SOCKET_KEY={0x8}, @NFTA_SOCKET_DREG={0x8, 0x2, 0x1, 0x0, 0xa}, @NFTA_SOCKET_KEY={0x8, 0x1, 0x1, 0x0, 0x1}]}}, @fib={{0x8}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_FIB_DREG={0x8, 0x1, 0x1, 0x0, 0x14}, @NFTA_FIB_DREG={0x8, 0x1, 0x1, 0x0, 0xb}, @NFTA_FIB_FLAGS={0x8, 0x3, 0x1, 0x0, 0x3e}, @NFTA_FIB_FLAGS={0x8, 0x3, 0x1, 0x0, 0x20}]}}, @numgen={{0xb}, @val={0x4c, 0x2, 0x0, 0x1, [@NFTA_NG_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_NG_MODULUS={0x8, 0x2, 0x1, 0x0, 0xffffe853}, @NFTA_NG_OFFSET={0x8, 0x4, 0x1, 0x0, 0x8}, @NFTA_NG_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_NG_OFFSET={0x8, 0x4, 0x1, 0x0, 0x3}, @NFTA_NG_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_NG_MODULUS={0x8, 0x2, 0x1, 0x0, 0xa0c}, @NFTA_NG_DREG={0x8, 0x1, 0x1, 0x0, 0xa}, @NFTA_NG_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}]}}, @osf={{0x8}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_OSF_DREG={0x8, 0x1, 0x1, 0x0, 0x8}, @NFTA_OSF_FLAGS={0x8}]}}, @objref={{0xb}, @void}]}, {0x38, 0x1, 0x0, 0x1, [@tproxy={{0xb}, @void}, @tunnel={{0xb}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_TUNNEL_DREG={0x8, 0x2, 0x1, 0x0, 0xb}, @NFTA_TUNNEL_DREG={0x8, 0x2, 0x1, 0x0, 0x9}]}}, @dup_ipv6={{0x8}, @void}]}, {0xf4, 0x1, 0x0, 0x1, [@dynset={{0xb}, @val={0x6c, 0x2, 0x0, 0x1, [@NFTA_DYNSET_SET_ID={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_DYNSET_SREG_DATA={0x8, 0x5, 0x1, 0x0, 0x17}, @NFTA_DYNSET_SET_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_DYNSET_SREG_KEY={0x8, 0x4, 0x1, 0x0, 0x15}, @NFTA_DYNSET_SET_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_DYNSET_OP={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_DYNSET_EXPR={0x10, 0x7, 0x0, 0x1, {{0xb}, @void}}, @NFTA_DYNSET_EXPR={0x10, 0x7, 0x0, 0x1, {{0xb}, @void}}, @NFTA_DYNSET_SET_ID={0x8, 0x2, 0x1, 0x0, 0x3}, @NFTA_DYNSET_OP={0x8, 0x3, 0x1, 0x0, 0x1}]}}, @dup={{0x8}, @void}, @tproxy={{0xb}, @void}, @hash={{0x9}, @void}, @immediate={{0xe}, @void}, @cmp={{0x8}, @val={0x34, 0x2, 0x0, 0x1, [@NFTA_CMP_OP={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_CMP_OP={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_CMP_OP={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_CMP_OP={0x8, 0x2, 0x1, 0x0, 0x3}, @NFTA_CMP_OP={0x8, 0x2, 0x1, 0x0, 0x5}, @NFTA_CMP_OP={0x8, 0x2, 0x1, 0x0, 0x2}]}}, @target={{0xb}, @void}]}, {0x74, 0x1, 0x0, 0x1, [@bitwise={{0xc}, @void}, @nat={{0x8}, @val={0x54, 0x2, 0x0, 0x1, [@NFTA_NAT_REG_ADDR_MAX={0x8, 0x4, 0x1, 0x0, 0x3}, @NFTA_NAT_FAMILY={0x8, 0x2, 0x1, 0x0, 0xa}, @NFTA_NAT_FLAGS={0x8, 0x7, 0x1, 0x0, 0x2}, @NFTA_NAT_FAMILY={0x8, 0x2, 0x1, 0x0, 0xa}, @NFTA_NAT_REG_ADDR_MAX={0x8, 0x4, 0x1, 0x0, 0x12}, @NFTA_NAT_FAMILY={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_NAT_FAMILY={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_NAT_TYPE={0x8}, @NFTA_NAT_REG_PROTO_MIN={0x8, 0x5, 0x1, 0x0, 0x2}, @NFTA_NAT_REG_ADDR_MIN={0x8, 0x3, 0x1, 0x0, 0x7}]}}, @dup_ipv6={{0x8}, @void}]}]}, @NFTA_RULE_POSITION_ID={0x8}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_EXPRESSIONS={0x5b8, 0x4, 0x0, 0x1, [{0x398, 0x1, 0x0, 0x1, [@hash={{0x9}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_HASH_DREG={0x8, 0x2, 0x1, 0x0, 0xd}, @NFTA_HASH_MODULUS={0x8, 0x4, 0x1, 0x0, 0x8}, @NFTA_HASH_MODULUS={0x8, 0x4, 0x1, 0x0, 0x200}, @NFTA_HASH_OFFSET={0x8, 0x6, 0x1, 0x0, 0x6}]}}, @match={{0xa}, @val={0x1ac, 0x2, 0x0, 0x1, [@NFTA_MATCH_INFO={0xa3, 0x3, "6d4ff6ed64ec86fa87fef35f7a7b8b05670e9f9bceaaaa09b7053f3981ed12950ccb7fd389a0bbee7d12d072335eaba9da09328fe0102424b1805e16c49471249c5eb99594f792568c6ad2ed88411456f6ca61f66f916736f5bb8664a36e53b5bec0e6be204e11584f5fd4bccf531f72a07885ed87a1d8292a407905f85291b7361cf2bc8f04f961c3d4650d19727a49c4dd4b89fad5b828868193f4b8655e"}, @NFTA_MATCH_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_MATCH_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_MATCH_REV={0x8, 0x2, 0x1, 0x0, 0x800}, @NFTA_MATCH_NAME={0x9, 0x1, 'syz2\x00'}, @NFTA_MATCH_INFO={0xc7, 0x3, "cddff29d8dcae085a61ca60ebc3674681911e2a053945259795539e1c7c98ab9011bd30967d9cd88122a10da8b7a0b58dfd48c82921bf2523436f8659f71ec7c57d72aeba5ba056ff61147d640298642f02be5a80fd8aa31133fa64d3d2d9c13fa5d97fdfb57657dec0368d112aaf320c3e133f997881c4ca9177cd8296ecf96e2d057e68c93cbc28a6752fec431cd52cc8b1bbd0752a1dbedcb76d07e6d561136c211ae72c68ad9c54abf32cb902d6d9c3498d679c7d7c6210125ae541fc2f83cb5cb"}, @NFTA_MATCH_INFO={0xd, 0x3, "59f65a3c6342807c8c"}]}}, @redir={{0xa}, @void}, @numgen={{0xb}, @void}, @lookup={{0xb}, @val={0x18, 0x2, 0x0, 0x1, [@NFTA_LOOKUP_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFTA_LOOKUP_SET={0x9, 0x1, 'syz0\x00'}]}}, @connlimit={{0xe}, @void}, @match={{0xa}, @val={0xb0, 0x2, 0x0, 0x1, [@NFTA_MATCH_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_MATCH_REV={0x8, 0x2, 0x1, 0x0, 0xb7}, @NFTA_MATCH_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_MATCH_REV={0x8, 0x2, 0x1, 0x0, 0x5}, @NFTA_MATCH_INFO={0x87, 0x3, "3307daaa53137e510599c7227bf1552844a82caed11fa72983b06d2284f2e5e9ee7161d050b4d77452c53b5e30b0c7ba713d49e8663ffcd8edaacfe46799dc910c585eade4ac68564755a29707e8872595662a4f48a4592090886f5786ca99e37067618d57ccdf1fc98c639e1c48b9ef084401d99fce4d46f15b84d564b0d291bb587b"}]}}, @byteorder={{0xe}, @val={0x34, 0x2, 0x0, 0x1, [@NFTA_BYTEORDER_LEN={0x8, 0x4, 0x1, 0x0, 0x6}, @NFTA_BYTEORDER_OP={0x8}, @NFTA_BYTEORDER_SIZE={0x8, 0x5, 0x1, 0x0, 0x7b}, @NFTA_BYTEORDER_DREG={0x8, 0x2, 0x1, 0x0, 0x15}, @NFTA_BYTEORDER_LEN={0x8, 0x4, 0x1, 0x0, 0xad}, @NFTA_BYTEORDER_SIZE={0x8, 0x5, 0x1, 0x0, 0xd6}]}}, @limit={{0xa}, @void}, @rt={{0x7}, @val={0x4c, 0x2, 0x0, 0x1, [@NFTA_RT_DREG={0x8, 0x1, 0x1, 0x0, 0x9}, @NFTA_RT_DREG={0x8, 0x1, 0x1, 0x0, 0xe}, @NFTA_RT_DREG={0x8}, @NFTA_RT_DREG={0x8, 0x1, 0x1, 0x0, 0x13}, @NFTA_RT_DREG={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_RT_KEY={0x8}, @NFTA_RT_KEY={0x8, 0x2, 0x1, 0x0, 0x3}, @NFTA_RT_DREG={0x8, 0x1, 0x1, 0x0, 0x11}, @NFTA_RT_KEY={0x8, 0x2, 0x1, 0x0, 0x1}]}}]}, {0x114, 0x1, 0x0, 0x1, [@byteorder={{0xe}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_BYTEORDER_OP={0x8}, @NFTA_BYTEORDER_SREG={0x8, 0x1, 0x1, 0x0, 0x10}]}}, @rt={{0x7}, @void}, @meta={{0x9}, @void}, @masq={{0x9}, @val={0x4c, 0x2, 0x0, 0x1, [@NFTA_MASQ_FLAGS={0x8, 0x1, 0x1, 0x0, 0x42}, @NFTA_MASQ_REG_PROTO_MIN={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_MASQ_REG_PROTO_MAX={0x8, 0x3, 0x1, 0x0, 0x3}, @NFTA_MASQ_FLAGS={0x8, 0x1, 0x1, 0x0, 0x20}, @NFTA_MASQ_REG_PROTO_MAX={0x8, 0x3, 0x1, 0x0, 0xb}, @NFTA_MASQ_FLAGS={0x8, 0x1, 0x1, 0x0, 0xa}, @NFTA_MASQ_REG_PROTO_MAX={0x8, 0x3, 0x1, 0x0, 0x17}, @NFTA_MASQ_FLAGS={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_MASQ_REG_PROTO_MIN={0x8, 0x2, 0x1, 0x0, 0x1}]}}, @synproxy={{0xd}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_SYNPROXY_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SYNPROXY_MSS={0x6, 0x1, 0x1, 0x0, 0x956}, @NFTA_SYNPROXY_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SYNPROXY_MSS={0x6, 0x1, 0x1, 0x0, 0x5}]}}, @dup={{0x8}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0x3}]}}, @queue={{0xa}, @val={0x2c, 0x2, 0x0, 0x1, [@NFTA_QUEUE_TOTAL={0x6, 0x2, 0x1, 0x0, 0x9}, @NFTA_QUEUE_TOTAL={0x6, 0x2, 0x1, 0x0, 0x1ff}, @NFTA_QUEUE_TOTAL={0x6, 0x2, 0x1, 0x0, 0x4d3}, @NFTA_QUEUE_NUM={0x6, 0x1, 0x1, 0x0, 0x2}, @NFTA_QUEUE_TOTAL={0x6, 0x2, 0x1, 0x0, 0x3}]}}]}, {0x108, 0x1, 0x0, 0x1, [@tunnel={{0xb}, @void}, @numgen={{0xb}, @void}, @objref={{0xb}, @val={0x50, 0x2, 0x0, 0x1, [@NFTA_OBJREF_SET_NAME={0x9, 0x4, 'syz1\x00'}, @NFTA_OBJREF_SET_SREG={0x8}, @NFTA_OBJREF_IMM_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_OBJREF_IMM_TYPE={0x8, 0x1, 0x1, 0x0, 0x5}, @NFTA_OBJREF_SET_ID={0x8, 0x5, 0x1, 0x0, 0x3}, @NFTA_OBJREF_SET_SREG={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_OBJREF_SET_ID={0x8, 0x5, 0x1, 0x0, 0x2}, @NFTA_OBJREF_SET_NAME={0x9, 0x4, 'syz0\x00'}]}}, @target={{0xb}, @val={0x78, 0x2, 0x0, 0x1, [@NFTA_TARGET_REV={0x8, 0x2, 0x1, 0x0, 0x3}, @NFTA_TARGET_REV={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TARGET_NAME={0x6, 0x1, '*\x00'}, @NFTA_TARGET_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TARGET_INFO={0x33, 0x3, "6e97b390599a6da17e2d6919aec25a2bb7418309a7d241ccad75b24c3f09056f60d69595198ae76c15b65b9292732f"}, @NFTA_TARGET_NAME={0x9, 0x1, '/,@@\x00'}, @NFTA_TARGET_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_TARGET_NAME={0x8, 0x1, '!\\:\x00'}]}}, @quota={{0xa}, @void}]}]}, @NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x5}, @NFTA_RULE_HANDLE={0xc, 0x3, 0x1, 0x0, 0x3}]}], {0x14}}, 0x97c}}, 0x0) sendmsg$NFNL_MSG_CTHELPER_GET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x1, 0x9, 0x101, 0x0, 0x0, {0x1, 0x0, 0xa}, [@NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x4}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0xffffffe0}}, @NFCTH_TUPLE={0x10, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000804}, 0x4) 07:51:46 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="400000001000050700000000000000c205000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:46 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0xd, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:46 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000749500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:46 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_DELTABLE={0x28, 0x2, 0xa, 0x201, 0x0, 0x0, {0x3, 0x0, 0x1}, [@NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x5}]}], {0x14}}, 0x50}}, 0x80) 07:51:46 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:46 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000014000000000000", 0x32) [ 2184.092275][T28702] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 2184.100459][T28702] netlink: 'syz-executor.0': attribute type 6 has an invalid length. [ 2184.175798][T28711] device macvlan0 entered promiscuous mode [ 2184.191493][T28711] device macvlan0 left promiscuous mode 07:51:46 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0xe, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:46 executing program 5: ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) r0 = syz_io_uring_complete(0x0) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x81, 0xff, 0x4, 0x0, 0xffff, 0x2, 0x3e, 0x6, 0xd1, 0x40, 0x327, 0x6, 0x9, 0x38, 0x1, 0x9, 0x1, 0x10}, [{0x4, 0x6, 0x4, 0x2, 0x3, 0xffffffffffffacea, 0x4, 0x7f}, {0x1, 0x9, 0xed, 0x2, 0x1f, 0x4, 0x80000001}], "2cedc9948577d23e2471f2c9d53accc17a3e99c5d97f37e37da41cabb0fbfc36eb3e8020c8c8cdbe1022f1756f6369311f96a49bc85499c01e157810c962968b5638f1f41a43dada45207460e801424200c889640658ceaade86", ['\x00', '\x00', '\x00', '\x00']}, 0x50a) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl(r1, 0x2c, &(0x7f0000000000)="5cc126") 07:51:46 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a000000000000050000000000007a9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:46 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000015000000000000", 0x32) 07:51:46 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="400000001000050700000000000000c305000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) [ 2184.261390][T28756] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 2184.269528][T28756] netlink: 'syz-executor.0': attribute type 6 has an invalid length. 07:51:46 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a000000000000050000000000008a9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:46 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a2c000000030a01020400000000000000050000000900010073797a30000000000c0002800800024000000000140000001100010000000000000000000000000a"], 0x54}}, 0x0) 07:51:46 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000016000000000000", 0x32) 07:51:46 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x18, 0x0, &(0x7f0000004000)) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r4, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r4, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r4, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r4, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r4, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:46 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0xf, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) [ 2184.387891][T28934] device macvlan0 entered promiscuous mode [ 2184.411770][T28934] device macvlan0 left promiscuous mode 07:51:46 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009502000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:46 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='maps\x00') lseek(r1, 0x200, 0x0) read$char_usb(r1, &(0x7f0000000200)=""/106, 0x6a) sendmsg$OSF_MSG_ADD(r1, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000040)={&(0x7f0000000500)={0xbb8, 0x0, 0x5, 0x101, 0x0, 0x0, {0xa, 0x0, 0xa}, [{{0x254, 0x1, {{0x2, 0x7}, 0x5, 0x4, 0x6, 0xfff, 0x5, 'syz1\x00', "ed11086208c3cf4464d7847a69d8b2bd99cd67e8e7a7f975f15ea10bcad9c1df", "19971dc3cb371742344e6ef638b71bc959eb1025c7d2baae4516e8b5c5df39a6", [{0x4, 0x7, {0x1, 0xffffffdb}}, {0x7ff, 0x8, {0x2, 0x5}}, {0x4, 0x0, {0x0, 0x6}}, {0x8, 0x9, {0x1, 0x1}}, {0x2, 0x9, {0x1, 0x6}}, {0xfe00, 0x4}, {0x2, 0x6, {0x3, 0x100}}, {0xff, 0x800}, {0x335, 0xffc0, {0x2, 0x9}}, {0x2, 0x0, {0x3, 0x6}}, {0x8, 0x2, {0x1, 0x3ff}}, {0xff, 0x2, {0x3, 0x6}}, {0x5, 0x2, {0x0, 0x8001}}, {0xfb6f, 0x0, {0x1, 0x2}}, {0x9, 0x80, {0x0, 0x8}}, {0x7ff, 0x1, {0x3, 0x6}}, {0x53, 0x4, {0x3, 0x1ff}}, {0x0, 0x80, {0x2}}, {0xffff, 0x7e0, {0x2, 0x3f}}, {0x1000, 0x5, {0x0, 0x200}}, {0x8, 0x7fff}, {0x0, 0x7, {0x1, 0x101}}, {0x7, 0x20, {0x0, 0x7}}, {0x5, 0x6, {0x0, 0x200}}, {0x1, 0x1c, {0x3, 0x1000}}, {0x1, 0x8, {0x1, 0x20d}}, {0x5, 0xdd, {0x1, 0x8}}, {0x6, 0x8, {0x2, 0x40}}, {0x3, 0xfff, {0x1, 0x6}}, {0xfec8, 0x2, {0x3, 0x7f}}, {0x2}, {0x0, 0x1000, {0x1, 0x3}}, {0x7, 0xfeff, {0x1, 0x400d}}, {0x7f, 0x401, {0x2, 0x284dc040}}, {0x6, 0x3c4, {0x2, 0x5}}, {0x5, 0x0, {0x2, 0x7}}, {0x4, 0x8000, {0x3, 0x8}}, {0x7f, 0xffff, {0x1, 0xffff8000}}, {0x6, 0x4, {0x3, 0x9}}, {0x20, 0x800, {0x0, 0x101}}]}}}, {{0x254, 0x1, {{0x1, 0xffff}, 0x80, 0x4, 0x0, 0x0, 0x12, 'syz1\x00', "b30823d04df176ac6e67c9606e1e9d063ca0cc2c0e5c51552fa6abd097031ab2", "dce23929ec4335d5c527a197ea9862385c56e865751de220bc23490ee11926c2", [{0x1000, 0x9, {0x3, 0x7fff}}, {0x5, 0x7f, {0x0, 0xfffffffb}}, {0x3, 0x4857, {0x1, 0x10000}}, {0x5, 0x60, {0x0, 0x3}}, {0x80, 0x2, {0x0, 0x6}}, {0x3, 0xd84, {0x3, 0x100}}, {0x3, 0x9a43, {0x3, 0x6}}, {0x800, 0xb08, {0x3, 0x5}}, {0x79, 0x2e2, {0x2, 0x45}}, {0x9, 0x35a, {0x2, 0xa84}}, {0x5, 0x1, {0x1, 0x3}}, {0x0, 0x9, {0x3, 0x5}}, {0x8001, 0x5, {0x3, 0xffffff20}}, {0x7ff, 0x0, {0x3, 0xffff}}, {0x20, 0x3f, {0x1, 0x200}}, {0x6, 0x400, {0x1, 0x800}}, {0x7, 0x4, {0x3, 0x2}}, {0x8, 0x9}, {0x401, 0x4, {0x3, 0x3f}}, {0x8001, 0xffff, {0x0, 0x553a}}, {0x9, 0x2, {0x3, 0x4}}, {0x0, 0x1000, {0x3, 0x1}}, {0xbdfe, 0x401, {0x1, 0xfffffffb}}, {0x740, 0x8001, {0x3, 0xf9}}, {0x2, 0x8, {0x1, 0x7}}, {0x9, 0xc87, {0x1, 0x6}}, {0x5, 0xadf1, {0x1, 0xfffffff7}}, {0x8000, 0x17, {0x1, 0x41c88207}}, {0x24, 0x5, {0x3, 0x80000001}}, {0x2aab, 0x80, {0x1, 0xefa}}, {0x9, 0x0, {0x3, 0x433}}, {0x6, 0x0, {0x0, 0x20}}, {0x1adb, 0x6}, {0x1ff, 0x40, {0x0, 0x100}}, {0x8001, 0x0, {0x3, 0x231}}, {0x9, 0x2, {0x0, 0xc0000000}}, {0x167, 0x5732, {0x2, 0x7fffffff}}, {0x4, 0x800, {0x2, 0x9}}, {0xd40, 0x9, {0x2, 0x7}}, {0x7, 0x0, {0x2, 0x4}}]}}}, {{0x254, 0x1, {{0x0, 0x1}, 0x0, 0x1f, 0xa9f2, 0xf2, 0x1c, 'syz0\x00', "c693a877fc1d050a3e21987d0c238c3a6cfdd0c8bc318f4cd251beae1f15d416", "f3456ac0a3a1b125be9725a15f8f015bd7e304ac6da9e8785090fce281cacdea", [{0x4, 0x4, {0x0, 0x1}}, {0xa352, 0xff, {0x3, 0x4a0e}}, {0x0, 0x9, {0x3, 0x400}}, {0x7ff, 0x3, {0x2, 0x7}}, {0x401, 0x4960, {0x6, 0x1}}, {0x80, 0xffff, {0x3, 0x800}}, {0x90, 0x0, {0x2, 0xbd}}, {0x81, 0x0, {0x3, 0x8}}, {0x1, 0x3, {0x3, 0x6a}}, {0x5, 0x8000, {0x3, 0x1}}, {0x551, 0x7, {0x3, 0x9fc}}, {0x7ff, 0x800, {0x1, 0x5}}, {0x6, 0x4, {0x3, 0x6}}, {0x4, 0x81, {0x1, 0x401}}, {0x8, 0x7, {0x0, 0x4}}, {0x4, 0x6, {0x2, 0x10001}}, {0x0, 0x5, {0x1, 0xbc14}}, {0x1, 0x5, {0x1, 0x4}}, {0x5, 0x40, {0x2, 0x9}}, {0x0, 0xfff7, {0x0, 0x7}}, {0x400, 0x3, {0x0, 0x7}}, {0x400, 0x3ff, {0x1, 0x10000}}, {0x9, 0xffff, {0x2, 0x1}}, {0x7f, 0x30, {0x1, 0x25}}, {0x1, 0x1, {0x0, 0xf9}}, {0x81, 0x2, {0x0, 0x5}}, {0xae, 0x6, {0x2, 0xe6a5}}, {0x1000, 0x1, {0x3, 0x6}}, {0x9, 0x400, {0x3, 0x3}}, {0x5, 0xfffa, {0x0, 0x50}}, {0x4, 0x1, {0x3, 0x3f}}, {0x95c0, 0x100, {0x1, 0x80000001}}, {0x400, 0x8, {0x0, 0x20}}, {0x7, 0x8, {0x2, 0x9}}, {0x9, 0x0, {0x0, 0x3f1e}}, {0x8, 0x7ca, {0x2, 0x7c9f}}, {0x401, 0xe172, {0x0, 0x7}}, {0x20, 0x9, {0x0, 0x1}}, {0x8, 0xf7, {0x1, 0x7fff}}, {0xffff, 0x6, {0x3, 0x9}}]}}}, {{0x254, 0x1, {{0x1, 0x1}, 0xae, 0x0, 0x8, 0x3bfb, 0x1c, 'syz1\x00', "d480ca5d193bb9bccd6c14bdff24e3af7ed46e6c325216059756bf9710a6ba5d", "c9db1a8ee1e16c7f3caec0aa69adc6a0d4c1fe5f56fd8f65af85647c723953db", [{0x9, 0x461, {0x3, 0x3}}, {0x7ff, 0xff28, {0x0, 0x2}}, {0x3, 0x2, {0x0, 0x7fff}}, {0x1, 0x7, {0x0, 0x1f}}, {0x6fd, 0x20, {0x2, 0x2b7}}, {0x401, 0x6, {0x2, 0x5}}, {0x40, 0x9ad}, {0x2, 0x5, {0x3, 0x8}}, {0x7ff, 0x6fe, {0x3, 0x3}}, {0xffaa, 0xbd00, {0x2, 0xf8}}, {0x2, 0x0, {0x2}}, {0x0, 0x6, {0x2, 0x100}}, {0x2, 0xfffe, {0x1, 0x6}}, {0x7, 0x9, {0x0, 0x2}}, {0x2, 0x0, {0x3, 0x3a2}}, {0x4, 0x7, {0x0, 0xffff}}, {0xe4ae, 0x80, {0x3, 0xfff}}, {0x25, 0x6, {0x1, 0x101}}, {0x5, 0x20, {0x1}}, {0x5, 0x6, {0x1, 0xfffffff6}}, {0xd302, 0x2, {0x3, 0x1a5}}, {0x52da, 0x7ff, {0x1, 0x2}}, {0x6, 0x7, {0x3, 0x5}}, {0x5, 0x36, {0x2}}, {0x2, 0x4, {0x0, 0x7}}, {0x7, 0x6, {0x1, 0x282c}}, {0x3, 0x4, {0x0, 0x1}}, {0x6, 0x1f, {0x0, 0x7}}, {0x3f, 0x5, {0x2, 0x5}}, {0x6, 0x1, {0x0, 0x1}}, {0x8fe9, 0x7, {0x0, 0xfa56}}, {0x1, 0x9, {0x3, 0x7ff}}, {0x9, 0xa885, {0x1, 0x7}}, {0x1, 0x3, {0x0, 0x10001}}, {0x8000, 0x1, {0x2, 0x1c}}, {0x3, 0x20, {0x3, 0x7}}, {0xed7a, 0x9, {0x1, 0x4}}, {0x1, 0x0, {0x3, 0x84}}, {0x3f, 0x1, {0x1, 0x8}}, {0x7, 0x4, {0x2, 0x4}}]}}}, {{0x254, 0x1, {{0x1, 0x9}, 0x0, 0x1, 0xff1a, 0x6, 0x20, 'syz1\x00', "0ca16bf69c9979a02a6471b873770212ee2a3712ddc4c778314a1787ed86376a", "44d7eec89a6340839dcf9a8508d7bb95c6760259bdee5cfd7b3a652b321c5de8", [{0xfff, 0x6}, {0x7, 0x1e4, {0x3, 0xdd55}}, {0x1, 0x0, {0x2, 0xfff}}, {0x7, 0x7, {0x2, 0x1}}, {0xf000, 0x3f, {0x2, 0x6}}, {0x8001, 0x1, {0x1, 0xfff}}, {0x9, 0x7ff, {0x2, 0x8}}, {0x7, 0x5, {0x3, 0x5}}, {0x6, 0x8849, {0x0, 0x8}}, {0x81, 0xe530, {0x0, 0xfffffffc}}, {0x0, 0x4, {0x1, 0x8}}, {0x771d, 0xff, {0x1, 0x4}}, {0x1f, 0x80, {0x3, 0x10000}}, {0xff, 0x80, {0x0, 0x1}}, {0x3, 0x5, {0x0, 0x9}}, {0x0, 0xd88, {0x3, 0x20}}, {0x3, 0x8000, {0x2, 0x5}}, {0x3f, 0x0, {0x1, 0x1f}}, {0x7000, 0x5, {0x3, 0x3}}, {0x8, 0x9f3, {0x0, 0x4}}, {0x0, 0x3, {0x0, 0x850}}, {0x40, 0x8, {0x1, 0x4}}, {0x8001, 0x7, {0x0, 0x9}}, {0xd7, 0x1, {0x2, 0x6}}, {0x9, 0x4, {0x3, 0x1}}, {0x0, 0xa34, {0x3, 0x1000}}, {0x5, 0x9, {0x1, 0x2}}, {0x1, 0x4, {0x2, 0x69d}}, {0x7f4c, 0x1, {0x0, 0x7fffffff}}, {0x5, 0x101, {0x3, 0x698}}, {0x1, 0x7ff, {0x1, 0x100}}, {0xd51, 0x6, {0x2, 0x10001}}, {0x200, 0x5, {0x2, 0x20}}, {0x8000, 0x6, {0x3, 0x401}}, {0x7ff, 0x9, {0x2, 0x3f}}, {0x25, 0x1, {0x3, 0xfffffff9}}, {0x9, 0x8001, {0x0, 0x401}}, {0xc03, 0xf801, {0x2, 0x4}}, {0x5, 0x3, {0x0, 0x2}}, {0x1b, 0x9, {0xde86a0ced2ad43df, 0x6}}]}}}]}, 0xbb8}}, 0x8004) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [], {0x14}}, 0x28}}, 0x0) 07:51:46 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000017000000000000", 0x32) 07:51:46 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="400000001000050700000000000000d605000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:46 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x18, 0x0, &(0x7f0000004000)) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r4, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r4, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r4, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r4, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r4, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:46 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x2, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x54}}, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_DELFLOWTABLE={0x20, 0x18, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0x2}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_NEWTABLE={0x28, 0x0, 0xa, 0x3, 0x0, 0x0, {0x5, 0x0, 0xa}, [@NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}, @NFT_MSG_NEWTABLE={0x70, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2, 0x0, 0x8}, [@NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x2}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x944d154ca3aa9b5f}]}], {0x14}}, 0xe0}, 0x1, 0x0, 0x0, 0x40}, 0x0) 07:51:46 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009503000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:46 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000018000000000000", 0x32) 07:51:46 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x10, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:46 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009504000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:46 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x18, 0x0, &(0x7f0000004000)) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r4, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r4, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r4, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="394a0f7c390cb429aba027ac14d54d6300000064232f6b7eb23f4fce334c9042b6d27fa16b115dceb4a0aaae6a06ec66f193bc712b38c48008ab7018efe0d161720c98fa1d03782adfee5ef046c63c7492a5d996fca4121f433753854208cb684d539d552d4cf711dd2f871be05dd0f2afd2f70dd2d9e27f5e34a88cd5af7d0e9bf75551d3e78d661cd0e4b69850ae0bb172e7d45192f0ff539af8ec51460983a165b7b55662a7fa3f6f313eaa3760aa2c505396bb59a055ee885973ba3d769377a387b966a8d5f88fe61a6ffb974de7500a9bd1735d802bf29f532575e583af79ad4c3dfb5c5c0033d961b0b71c992a9154d0a85dbf6b2e0bd133ad3ea512ca4cb2", @ANYRES16=r4, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r4, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) [ 2184.648545][T29060] device macvlan0 entered promiscuous mode [ 2184.676937][T29060] device macvlan0 left promiscuous mode 07:51:46 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000040)={&(0x7f0000000500)={{0x14}, [@NFT_MSG_DELRULE={0x1dc4, 0x8, 0xa, 0x5, 0x0, 0x0, {0xa, 0x0, 0x9}, [@NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_USERDATA={0x60, 0x7, 0x1, 0x0, "afc1c404bc8b3cfff17f81d6211263247ba429b8e7dd0b17638d5ffe6ed697270e3f014cb4c72b938ec55df0be730b8a4308f6d368dd22f62f80af768fd8bf279350836d37dd882dd48da026d9596d4140103ecb88d45edad676fcc3"}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_RULE_POSITION_ID={0x8}, @NFTA_RULE_ID={0x8}, @NFTA_RULE_POSITION_ID={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_RULE_EXPRESSIONS={0x1cfc, 0x4, 0x0, 0x1, [{0x146c, 0x1, 0x0, 0x1, [@immediate={{0xe}, @val={0x154, 0x2, 0x0, 0x1, [@NFTA_IMMEDIATE_DREG={0x8, 0x1, 0x1, 0x0, 0xd}, @NFTA_IMMEDIATE_DREG={0x8, 0x1, 0x1, 0x0, 0x9}, @NFTA_IMMEDIATE_DATA={0x128, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VERDICT={0x38, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}, @NFTA_DATA_VALUE={0x1a, 0x1, "ffeab8258165aaf973fb4b52d6b8f9cee90d7af021a5"}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VALUE={0xb1, 0x1, "b2e01bc551649acbb7585639266365f928f1b81bdd6126668475b18204788df5f583f5006f6416d00c9179e135098d506d34ade249f1d305d7315e41e6539e0bde4c519d33a923fb134bb3e6f48c86d6facdc83a6482c8db8d4fc34d012471690b71363f585fb07e91a99bcb7b4ae37ec5a27b2a6e06a668a131fd0a41efb8f035b37069ba10bf1c24cbf2fb02e1a21dccd2864da9b67ab33b991264bec9ed1adebeabd26fc8f0b4bb27e140a6"}]}, @NFTA_IMMEDIATE_DREG={0x8, 0x1, 0x1, 0x0, 0x9}, @NFTA_IMMEDIATE_DREG={0x8, 0x1, 0x1, 0x0, 0x17}, @NFTA_IMMEDIATE_DREG={0x8, 0x1, 0x1, 0x0, 0x9}]}}, @dup={{0x8}, @void}, @immediate={{0xe}, @val={0x11cc, 0x2, 0x0, 0x1, [@NFTA_IMMEDIATE_DATA={0x10f0, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x6b, 0x1, "2ffc2a6bb43fb3522847fe64fe6048b75f366f0827cbe6eeae97ce5a5d7b9a90d1d6805f706d6be34c7ef48492c7bd183ed6556d00c48cf438eccd032e9fcf6605334c3054c83645d3a499d5f5b114c28394f8b0266da22478a940c5a1db94fd2e882163a5156f"}, @NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0x1004, 0x1, "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"}, @NFTA_DATA_VERDICT={0x38, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}]}, @NFTA_DATA_VERDICT={0x18, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}]}, @NFTA_IMMEDIATE_DATA={0xd8, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0xb7, 0x1, "0ebce42b34073561b4505a4e68ffc5b73a5309bf3cf5f12c5875bf744017e3d6bf26392ed72c569678bd76671a0674390dc5c430747284dc3e5467bf387833544d19d874c684f2daf96691d879fd3662437f3d9c308ee614683fb902629651ecefe8835468bcd300d007ea4e75833826e95f2e0e48f557ac3c3e41c673fef9cc6a3841b7439b26f4b7f09758b86dfecca621ac866f8708a56722d3c7a3db9b32a904fe311917ccf514d52a1c6ba282d7c5de22"}, @NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}]}]}}, @counter={{0xc}, @void}, @dup_ipv4={{0x8}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_DUP_SREG_ADDR={0x8, 0x1, 0x1, 0x0, 0xe}, @NFTA_DUP_SREG_ADDR={0x8, 0x1, 0x1, 0x0, 0x2}]}}, @synproxy={{0xd}, @void}, @quota={{0xa}, @void}, @synproxy={{0xd}, @void}, @match={{0xa}, @val={0xc0, 0x2, 0x0, 0x1, [@NFTA_MATCH_NAME={0xb, 0x1, '.]!\x83}\\\x00'}, @NFTA_MATCH_NAME={0xa, 0x1, '[#)}\\\x00'}, @NFTA_MATCH_INFO={0x9b, 0x3, "d63712740bf75a6dc29d5f2cb47bb082819f0c244f6266aa251151b3f0ded1995f0c48fade919e8686ef0f93506d84716c238a2539f61dd9ec88e90627a13e03bfea5594f1c6e5c97d3815b858d89f8e35f2b19d553c782c81fef830bfa999700749371b77d922e79985fea23aa6d9b766ed5d5245e3ad5a08c5ec1b6b1f535bc383917befdd3eb2acb7aa93a3775aed2e0a9e12fcff56"}, @NFTA_MATCH_NAME={0x7, 0x1, '%-\x00'}]}}]}, {0xcc, 0x1, 0x0, 0x1, [@fwd={{0x8}, @void}, @tunnel={{0xb}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_TUNNEL_DREG={0x8, 0x2, 0x1, 0x0, 0x1f}, @NFTA_TUNNEL_DREG={0x8}, @NFTA_TUNNEL_KEY={0x8, 0x1, 0x1, 0x0, 0x1}]}}, @meta={{0x9}, @val={0x3c, 0x2, 0x0, 0x1, [@NFTA_META_SREG={0x8}, @NFTA_META_DREG={0x8, 0x1, 0x1, 0x0, 0x15}, @NFTA_META_DREG={0x8, 0x1, 0x1, 0x0, 0xf}, @NFTA_META_DREG={0x8, 0x1, 0x1, 0x0, 0x7}, @NFTA_META_KEY={0x8, 0x2, 0x1, 0x0, 0xa}, @NFTA_META_SREG={0x8, 0x3, 0x1, 0x0, 0xc}, @NFTA_META_KEY={0x8, 0x2, 0x1, 0x0, 0xf}]}}, @objref={{0xb}, @val={0x30, 0x2, 0x0, 0x1, [@NFTA_OBJREF_IMM_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_OBJREF_SET_ID={0x8, 0x5, 0x1, 0x0, 0x1}, @NFTA_OBJREF_IMM_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_OBJREF_IMM_NAME={0x9, 0x2, 'syz0\x00'}]}}, @fib={{0x8}, @void}, @queue={{0xa}, @void}]}, {0x3c, 0x1, 0x0, 0x1, [@xfrm={{0x9}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_XFRM_SPNUM={0x8, 0x4, 0x1, 0x0, 0x2}]}}, @dup_ipv4={{0x8}, @void}, @payload={{0xc}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_PAYLOAD_DREG={0x8, 0x1, 0x1, 0x0, 0x14}]}}]}, {0x1c, 0x1, 0x0, 0x1, [@exthdr={{0xb}, @void}, @objref={{0xb}, @void}]}, {0x768, 0x1, 0x0, 0x1, [@counter={{0xc}, @void}, @cmp={{0x8}, @val={0x22c, 0x2, 0x0, 0x1, [@NFTA_CMP_SREG={0x8, 0x1, 0x1, 0x0, 0xc}, @NFTA_CMP_OP={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_CMP_OP={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_CMP_DATA={0x210, 0x3, 0x0, 0x1, [@NFTA_DATA_VALUE={0xd0, 0x1, "0e70af0d8e50970759cdaf0ee999fb1cbe24ca57e4b56caabd6d471e4bbeb5d3cf2fd2912f2409d99b46eb52d5ed1778393c3be1f229b9743a9d8e6a67d1e98ffbbe17db4fb2dc62a0dbc98e2681a04a19d90657d4803c50d9cc992518dba3472a4cb09de3d0a2c3fc990ec89269553d18cce49cae8ff86be53578193eebfb1b7880add4df942e33b182dcf826c161e365c17d11acc9e00eae8db431b6da88f23c83e4c7c750ff8f6cea393fc4f948e4757a36e6d7cebdfdffeb2a0f7cbc2cf3d0064bfa3b04dda705271086"}, @NFTA_DATA_VALUE={0xb8, 0x1, "05a5d6f5312b79b7d70e171e264e750be0b576d9e87e793eb1b2ce8054c2e6d11a177416921ff622738189237336135665b2dbf2abdc128f61d3f845550f79c51a42b005aa8436646cc10ae9eff20b1c9cab668a04c5958da5f1f0f2a3af7542fdb05d8caf1a09ae6c9861ea69bbe58da4f1df696faaaaf174b25cae52daa0eb8264c053254024fcafae52ad6fdfc1d1fadde96820081b8299c98b6580aff64fc189f0864f89827985ab0f785fb0e67bac0d43f1"}, @NFTA_DATA_VALUE={0x7e, 0x1, "0f96cf53209c66dae520daf28721abd82bcda8a2d890dbe2001cf89f4e1458f55d3a9fa3ecbde29e7a7de70c7bd5b6be2f94b73ee0bbdd85900b120194a53e8b610b48c28932f74f07d7de29708942da8df8437a2eecac53d663231ed3861d4f305f3598e188e252e36ce6c56fbe251a5c2c6fdfe939597b5100"}, @NFTA_DATA_VALUE={0x4}]}]}}, @cmp={{0x8}, @void}, @dup_ipv4={{0x8}, @void}, @cmp={{0x8}, @val={0x50c, 0x2, 0x0, 0x1, [@NFTA_CMP_OP={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_CMP_DATA={0x30, 0x3, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffff6}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}]}, @NFTA_CMP_OP={0x8}, @NFTA_CMP_DATA={0x3a0, 0x3, 0x0, 0x1, [@NFTA_DATA_VALUE={0xe3, 0x1, "925612de7662a1e487413850dfc9e1f0aef95febcf6dcc5b9827f199ec225c9e36fc65834645c01e4cf825ca113778b58dc1827acd50afd159cb17c27cdfe8af633c6dd26be83a70d10182c9ef9d5ac66f1c40e3a58a9d482885d1d00bc4588b148977f8370cbe7c765c27c1423707d6e3350b90ac4d81699befdba83bacfd581cb671d2ab87b8d42ab851721bc64fa9a3e2fc52afa8feea13a411e4591f20314a0ffda946e9f0e1f5bd96d7f8e300a6cc2f263d11a78ca4dc9a4fd585060d1a2d0578c32582b43c6d977c5308b9464ba6e2f47638f1e0b2cc778d26c2e602"}, @NFTA_DATA_VALUE={0xa, 0x1, "a3b97ccfd273"}, @NFTA_DATA_VALUE={0x6e, 0x1, "f53bcb0bdbd7f3221ec9f4266591a8165fdc92e37a9515823840d54aa0388f69971ba86c1b5391d72af0ad92dc793f7c5d1369993c062d4602e2d62691143b08a6a70f75bbf71ccc9fd3c6b6949c3808b202a7767cfe017fc8aad99376bcd2178344885405b1c5d551b0"}, @NFTA_DATA_VERDICT={0x28, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0x52, 0x1, "ee86ce1345af475ea912edf7bd2792b15725ac364492b439168efd741556bfe7037d150ec95b3e2ffe65ca268aef772766672d7ecae2f1a037a5b13d5c10924e847451ed3e7f200aef32087eab59"}, @NFTA_DATA_VALUE={0xa1, 0x1, "20147dc23159e37e50234b4943d1e59ba22f5edcea0b2ab88da863355e0b3cdf3b57765f1b6253f22d56a3f46bdc4a1fd6c30b0ebd628258a2dfd3d02c171b32f1f0ca5b6a9c66f660cd863909c9054360351a661f6d320467915bd55067775c171bbc980f49e304994143a18be8656a3bfd165425085d9bc12121137098c1d647ff1e15aea4518f6431107b8115465049f6af65bc564f282a62bbeaf6"}, @NFTA_DATA_VERDICT={0x18, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0xac, 0x1, "560897e2e279740f0dd2c73910c17fd65e9faf7a38f5e260287e784e060e9421c6f239e1e8c2a821744f1791924bdb8ac5d4e6666d9402c5af8fb2509aeeb6f8c3ba3ab454489e0d01eaae14ffc25711c6163e893b05e348bd1e0879c8502abf8a769aef22cfd30217fb9ded144b242c94ae0db4df580b33481fe0f020b0967f4dac62f0d69d8de44cd207b6aebcef0f632eb17ee0f07b5cd1f4b582c776d06885ca6b6e23f309ee"}, @NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VERDICT={0x3c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}]}, @NFTA_CMP_DATA={0x128, 0x3, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x34, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0xd1, 0x1, "cfb68948b3eee35faf3ef257346c2cda719bffc6551b0e6752b121ae71e161a84723289a8550f3dd757e6a3dc759e749a0c70aacfb03d512938c29cabf37727017e708e6a5889340196de3a33625dc15305d5b5d6c6afebed4661cec5c09f5f4629a2e0266b8bcff8bf0af09d3511826c5f82b44498af6ba39fc2c06be7261c6e9c3e2c0e73c308a08738225210135391187d6b8ac2217e2d90a15a644fd766f14ca0089a8294b031a8fba6d37dad3e1d9cc1d9028dfd722a2bd5c132859f2e27046609df805eef3fb358da0b3"}, @NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}]}]}]}}]}]}, @NFTA_RULE_HANDLE={0xc, 0x3, 0x1, 0x0, 0x3}]}, @NFT_MSG_NEWCHAIN={0x98, 0x3, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffff8}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_CHAIN_TYPE={0xa, 0x7, 'route\x00'}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0x30, 0x4, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xcf05415}, @NFTA_HOOK_DEV={0x14, 0x3, 'wg0\x00'}, @NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x306424e8}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x4}]}]}, @NFT_MSG_DELSETELEM={0x1c44, 0xe, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x5}, [@NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x3a8, 0x3, 0x0, 0x1, [{0x2d4, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x150}, @NFTA_SET_ELEM_KEY={0xe4, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x6f, 0x1, "1510f9ef021c7fe8dd1a2a48329fe5f33d5e8d6f4fd670ceed1742bdbc8ee5d7811567467078d3d290f6f61d45b151e4d2d21a84ff95acde3bb7d8617142b8d6f52325b92b09bb1973463aff16ea79bc3e71fb1d648ab399abf17e33cbd2e6480442ed5e2172a4cd155c57"}, @NFTA_DATA_VALUE={0x67, 0x1, "bd8213d750d29d4c1d7e626c2fa056adfd5def2c870ca25d983cbdccb61d0ac2984cadc71ea742107f222ba19b8760daa61092bb71f6e51277c407e0bb0c72d681b38f4913d4fdad80bdd2725c406914531bc3de1e693f4e0675f642315b5f5abbcddf"}, @NFTA_DATA_VALUE={0x8, 0x1, "2f12180a"}]}, @NFTA_SET_ELEM_KEY={0x7c, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}, @NFTA_DATA_VALUE={0x3c, 0x1, "1c41a96fb698c9300dbc87016d02e4f67e1a16e081e305312bd6a34632de87769b69fa3261ccb377c7e10388d4daa7376296b550dd334ed0"}, @NFTA_DATA_VALUE={0x20, 0x1, "ba38a634b5f463fa79531cc3eb9c6823309a1e851afcee644a190408"}]}, @NFTA_SET_ELEM_DATA={0x6c, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x34, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VERDICT={0x14, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}, @NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}]}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_USERDATA={0xf2, 0x6, 0x1, 0x0, "7a1ff17c11ca191be8f0e140dbf8637b6f63e1fddf21f7ec5407601f0d63f95a0bb33412f8ae9fe42b4300e7844f0eabdce2bde12f6ba363976a8401510503f954b2770d0bbf78b4363eb4875d6184a380a277691a17864ef28a5239e8c4d804ad8efc129f89fa72797eb72ef3ad0001702b91986e72325441dcbb4ee7484d09882ab90e1881872b17089e86b87ee4bed633cfbf31d3e58c6a3faf82fca044452004300d4267031bf8ad61155197faf8d7edf0c5f6ba0c5edac025d673e125d09b0e2f1e5286d0886fdb65de1a855e009dd422993bf727c3827cb1dea62348f43f4744d6100df90f1b2a763bc04d"}]}, {0xd0, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0xcc, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0xc5, 0x1, "ed6d5fd1f05502ff2448d53e90a1289dfda768bf49ee5aa9bf482a0f28094870fd849e733520482580ebbf786da4b373afa32f8d8524fca63a95ed9ebf329f9d3ae5fafb13158b98ee2fb7b11e33adab3e81afd2c3d66bb0f3e1215edb3c9354a7f3d563d67be6b2fdd6c3d5e466fd2059e3a4ecf3eb1db8af715d5004ac8409bfaef0f7ec0aa5921dfbe3dec398921ff5b76e51a06f55723a92301974cd3b5025e02f27347d8807408b473340e77161beca99dd21284b513007b08999e2a36f49"}]}]}]}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1844, 0x3, 0x0, 0x1, [{0x384, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0x33c, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0xc2, 0x1, "581e6bc8f5854a7aed43a88299930ee95879f1f0e585d85f4af41d9b37f8a311ac3f594c4d4dbcb6cf00618df6f2fc67cbd49a2786dedfab3634eba4d79b12264c333c7fd8fed9aed759277cca2e06ebdb581def934a34669bff0da3da92939d91eb63f71ce8b12f0d6855890a90c56e6521ee69399671640d7b3ee7af7e61b88ebcab0a6f3e45016b5db7c7e04c3bc13ef55d2d04ab3b7ac42c749583eb38df46dfc7afddf8bac1396e5d3f67469d47fe9e52cba720fd342ff085f143fd"}, @NFTA_DATA_VALUE={0x77, 0x1, "4d6787425a02162047bd724bf421cd804652a8ceaa0cefd88242b4cab51fff705aa3cd813372c39aa78e72e1cfb64764cf90abfb13615a9d3d770f846af23de72345fcd2cfc3c2600a04d9cd4682d879e1770d7692f5e12e3a1777cdbf8b49b022b96a64ca8aa4a098d73de832b16f668eb551"}, @NFTA_DATA_VALUE={0xe3, 0x1, "8dedf53eb9c4601d40ea3e86f659c217b9c0e2c25b635ad25ecf611eb3bf0596508c0688b07ab72a8a71f8e917b0eb4afdda87dcd92f3a0829e2c14a37df904a57fd8f1a180328317a85534bcf68ab46816eb7ba8ee1f4dfadcfe629085a5e2f9f952a1be7b5a65713d345c23429f933f72058286c60b36f55655f75ac1d006ff4cbc244a5d9e7b946df30d3cc2a6aec3f11142f61db932afe85baf0064198d01a8048b7a514aea1a42ee461ffb3e2ade6182fb0681dd6343088347e53cca73f94825eff8765b9c2209557801d20088e35641a2afc1039cb02089465eeb879"}, @NFTA_DATA_VALUE={0x4}, @NFTA_DATA_VERDICT={0x3c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}, @NFTA_DATA_VALUE={0xd3, 0x1, "d1449819154edb7719002d2458df1cd9bca4c6365899a539e58079a0603c02eabcec06b3e7e4ed0f87c636257d87c4dfb2c2acc5d58346bfc863b53f8a061026bc873673404759a8bbeaf60eb9f3b85ca6405184258c368b718339d748f08b7a6e44cfd7048bc694b2448c647c9c218472c7ca352791356231e3320f127e2aabedab12b4dae94ef8a0d1da6b4ad16f00f118a7cd21e40bdbbe3d15d3195add1ff211d59437cee5c65f0e7818faceeff2c1a2dc9333eddddb81fd51530dd9bf55c447050f64068dd82e078d705ea052"}, @NFTA_DATA_VALUE={0x4}]}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x8}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x9}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x9557}, @NFTA_SET_ELEM_USERDATA={0x20, 0x6, 0x1, 0x0, "7be8b108c1126294d5bc04a495e8f1a6df7591dc266f9e9506f9241a"}]}, {0x1a8, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0x164, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VERDICT={0x18, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0x93, 0x1, "2f2422a463703bfe8128155dcbf14fadb2e0f98bf9083b6a164e51e018c21a7a59ff561b75193d1321fef001d362846486f4bb2102654d718b73c66ca57ee2cfaaa65b7f7f8ec47c49e75a408d047df6bc14befa5c5805b22eb2cf4bf8a05629f97206fdc17a36f6a6f3bb2a2d2d23e2263acfc72fee3eeecb6e2b874f344e676ebfdd0328b9a02027d6390c54b9f0"}, @NFTA_DATA_VALUE={0xa8, 0x1, "17a20790e2209a5d260d3469d714df1ab7895e3f7f9edba7eb372a959b8468841c41dd6b312b6b5700f9568191400684800a564f8234abd29d19927fb5de4a3909af12edb7184093e4bad48d4d80c880bf71cb7858435100bbc74550ce4953d2bd05c8c03e9f221913f83de09000e1c1b68709c71aadb3ca810c17adf651a707ea24dd8bf0bf40fa9ac39345ccf5476671213c983aa730fdf27fbf418f58efc0afffbd8d"}]}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}, @NFTA_SET_ELEM_TIMEOUT={0xc}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0xfffffffffffffffa}]}, {0x188, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}, @NFTA_SET_ELEM_KEY={0x15c, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x87, 0x1, "5236e9b736ffa69b3b454c59499cb873e2fc2df10a5d1725dc37f9f9ebf576c7731299f8b9c6de49002ad2534e4a7c5055832bfa5b49c19c3314c42ee3600107a8a28f0d6a276161988e19e5d71238b69f5e15b992d84850509c4db6092759dbbbb25b01a4ca51aee70b6c4d65ffc01a1ef76417e8f140bdd7a780fd8d197ea384b0cc"}, @NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VALUE={0x21, 0x1, "905e32463600c80033a87187b78578d36c73650212869ac1e454264944"}, @NFTA_DATA_VERDICT={0x4}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0x65, 0x1, "73e526bc4e0d8f6f2a3efa1d84851ecf9f96d1990eac70600cb72080100e3b0c235c6d1f41c0db352cf6419b8f468ba351bd8e2367fdfd07346bac7776bbb3f663b0f940a9b14e4fe626b148269160871198e234ba7422eb1dba2f3dc626dda804"}]}]}, {0x116c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x8}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_KEY_END={0x1150, 0xa, 0x0, 0x1, [@NFTA_DATA_VALUE={0x54, 0x1, "f3d3088abefd7919c999bff872dfa00db228657c686e9386985b598e03ecdcf4e7496c74f06aa7dc2b4b4a63bc17e247c24e18ad047e9770ce25b85b9e528f706356ccb435ffec02c982d5411580213d"}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VERDICT={0x38, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}]}, @NFTA_DATA_VALUE={0x4a, 0x1, "1dc974dfc8c90f87e1d71534a73fdb6e22bf2fcb0865e52b1a7704dd102feec15abdac2eedce164d84ce2cac785e380c2e53adefdddce78fcc14772f1fc2396deaa6552539bd"}, @NFTA_DATA_VALUE={0x1004, 0x1, "249405ff94aec53ef82392734c7bd7f60290307567075fdb1b9bf6dcf46fc3455a02c32980c5e310b377a949b34fd5bfe3d4437f5077d307d25fc798e5e46df68c382061d45ab5edfbc5c6b002cff7c5e9e9215e685de45afaabf45148caca25f5111cbfc33ae6f831ae7744bf05d97e7ad6134690657f9f1870b5c6c5c5b4f008f270b18c4738a2a127978ed4eec8728d62f4d1109828bc955b7159340b8494bdba6ddcf0d246201a60143ec28fcd8981fb75ff8062d0eb73cb0dac6d0b88d3d22b5210830da53f9cc94baaee4a106ecfe630eadd31f0ede047a55c49aad53724472fb7c28e661eb5a5548e21f14292ae8ae5d3cd13a7d33921400ab69928d7f8bdd718bdece32e7581a41a60698cef9d4b50530d231ef07df34017f86a4a778cd42a3f22d7676c933c1b06ea2f7ce7a2c82204e95bfb0f06f51239903ef3277c72f8aa7d4d7f07727fd63d5499dbd1a78679c91323a99b13ad0dec426356085dcc1ddcd28a49011529e8bb772572cfa9c5031e0150732eb7b3b9f27368b609da8bee002f14e5a87ef91f9a8d2016a7c3107c2eae0560013c61200a6e74fc7a9af2df5c3fa31fc117eeea754610006cde292e5d4797af726c64c4d055a4d78fd899a87a7e18d29e112c26abfefd7bec2a9ee087106f0f6fc1710a612a0f88d614e9eda1babd0c990339d7e6902f808438b3d1033dc98acecddc80f21aed9b9687b07e2e241602c3142f196fafe97eea2e1304f4e231cbabf8840985f2769e332f78b973133def2656621f5a8efd485ba67b9584fcce05553baa89a0d517dbf445dbd55157974ad8eced84df4e076e13e9b6dfe250d272b8c5508c9f68d051ff65ac850d78d962a2bfa5205967195a59988e4184e33266659d0c05dd2a3b6acdd26cef84e4e46127a561fc6c4249289ade1d0a3f77031bb8074592047efb17a2e0e472508863f25cc7021123d96539e563bc5148b924fe196d0c40323f1136f57efae9f2972d8fe120e3a983d62f235265ebe038dffdb8ea0ec7f2ec71b3ed83de9a506cce4912b0965900de4ff381153908bbfe3ae279a2f575930cf214c33d3ea58fc1d584e9a42fe21a4282e7771c91fdb0ff90f402758e21dc877a37bd51168023870188716875432ff7d003e46d19606396a5032acf6dfbbf690564346ca2d632581262edbbfb8f38ab9217a9897e2baea365ff6a84f92df83b7877df67d1c0ce9cce3401e739696bed09f4c0ef4ab6ff933096cadf96ffbd19c4b291e72dc3cd635c4b9ffaa1b813f00ca7220d96f470d9dfdff4671cb89b8dab3570a50dd6c8888cf60a8e37de83e69d59ccbf285aad867332ff0609d5ef5386306e96b2809824d30326134356c8b858b2e0dfbb8219eb420b5b4794d9d61cec8d39fddd54eb0f4dc5a636e42e61800d875bb0945ac8fe722f4a4e11b6636f524b6d1c081865faa259a49190dfead91df281a1676d02d65985f65609f4b370e75a7750b639772e18639313a2b5ccda84f623e7f0f60734f711f733d97fa4590758d9f95707021d54b19d2d0945e24f9885e96d1f73d96f219d31bb977b8253982dae3139fd59d3b967c27fb3139ca724f7620d7ad5b5b1ce9ae0f96c42ef5d63a828ef68032913d020bd2042b55a4b160d0d3762c347ca3262a1daa42b59e808e79b68e86b46c8702ab7e055a197e99519485a5becb8195affafd0dec47eecb7ef59326bae672660d5d4beab2a2f576de08a0724f3057c563a68c3204933f3f3c27fb24baa06fdd0a33201a8914619661527171be8936312687dae7c7633df7b25293b9507ab5162658c125123d93dd48b31d1d85a611f1ea073119dd11129eb53e8ff9c515f9a04e966163ab27789a00aacdc3b9672572cd04da1da94a13d8e717902824062d67d0ac18d8dda5ef44c886e120212053c00ce5392a39c52d4645cc32812af35aff30b42619db2be053b104a3f2ee9fceac8bbdd50a0909b16dee248788d9e5cb7394002553c9b3ac0604716414fcb9ace16faef2a1c011f5fb04b79af0d941b5a2d1f1d9d6addd6eb00b2701a93960eabc7dbaeb00d4ddc106174801a1b2a89874d5be7e93a4ab188e077dea3e86b4198bc2ab46abe6843f309fec7b7caf25761c8f5340a7c33393f9a15d016a7bc83e6dcc40b4fb9431ef14ed7ba34eee370205a1df6b58dff5cd13947e45295428d1f83616b96e74077606e4322e352717e342244b4b667658a69dbcb32a381b53ca2a56030faf010cf6416d9078a3127a6bf1cd20731d03b14afc5e9220e5c4a3ed506c758d344f049b040baa5772b670da796a45fe4718d766fc7e5fd2b9515868e34ea614b555022a55fb2600079a618144d5bce7f056d6b200c02c9396e95d253c83073dcd5e1f541183a406d4851e9ee7fb328f970fe51b7e599b89923e7043df85edbb519ed316f18aee3aa17ed69c713895a62c4a9f40008c381fbefd0dc58222e54532c2aa81431086646a7117e11b8794af72018b45a0117362a7a12bc8ac46ad0d936d51c4126357db881ed85f31093a460f0512db30a97311621a6fdcb200aeed5790ceb14c0927a4f00fd69edf4581f17c01797e541f84a47d757eed56e8b08d4ff9a587d2c5b7e7e4d87b20c46d861d88c372a36793ef12372c58bb8289a8183a7031b8fd4ee25b715089ba03a92daaaf71e2e1e3c728c7dd18c872c4809b5fdb682b761c2afe59a7cf5b08a789a009cfeccdac2b00b8f9c97ecfd44e59bfda914a7abf99186044b79d16c4f5e8abe00b633d641ca864d437f4e8ee9bdd345cb95c2d3b613a8c1cb495896f7483ac07867d7f26c8063ee119313d73183f0dafbf25fc0d3e2513b0f994b871598258391ef67ea085c474ab61241e0950ca8a466f83f7765a57ac643be966ce9aae2073ab60dc01df4964f114f8f994ccebf44b2aecc618e278bb14d41ab2d4b2608f328202b94cc8b9f3562ba42952518a9c3de80040ba1e408b015392fb9b7caa395840839d9f393fc71263bd06d8fd052271a1caa28780d3473df06e3e6e5d61f4f0e8304d454d7b841bbfaa3271f02a529c1ea6f7e9c615f55deef4fc1a970fdc01c6340ec932df552664fb99855eba895f1adce31f19cb895c1c33dab1a17edcdcde5285671e2b4946196b8a67317b65e02f1ffe416fc6ffd78aa8df6258d1db8b7590b329a9b11d457e1cfe7cae1aa8615c98a7d521fe06467b7ac28258d5270df695e7fccd5ac8aaaa56b9f4f460c015973e4a802439db49308fb305f4934a115654af75dfe5e14ea2ac2d3654885972027e87cd9cbd74066feb957acd52922095ba2cd6a52a986a11e1d0350797b5c2052c840c5d5f2e6dd7439544d9f62a0e3f6345e0cb81a332a27f5b97d219a7ccc59247bff2811b5f313c0c47e2275b3186b495e33103f4a958604ae06f0c4f5c91a6e1894e7510842b863911c7822bce9d88255c095aca62d36dd252f3579d1bfb6bcbd19efab73a0ee02c5df2e4c812228d704aa2f8ddb08864ff6d4b4987075d000b82b60076caa693258e006f1615520201d208888edcf0531b93e2f431b6e3a106df44a81ab504d915a5f65e24685e2a44c2e5daf7cfb53b5f00dc08afb848715571153daf8037c11bafdd9040db88c4926738990e034e296e5ed338f0036d838000b06c02a5d43c1ba1c9f08fefff81a55fc3cb9e9d47ad6eada9caf2515681b75b0bb8eb820eca5339c75fc0d4b873cd19c0d1fa8f81e54ce60f544c999236e9a04877f5ef1c194df636029d533d919426f9677220483ac0c933e672761e5cdd886bec28c8c40b44fd50ee4ed15f4af3ba4341db4c3854d89a9c53b003cede32439c845c1e05cef95efd2cbfddaf88faf511660d2af715c91963156679dcd515012dea36de2ec6c34cdf303a7f479a55590e3a1c2674d91525b862fb34cc59fbd7f7fde67dc1fc6db2a3bef5f7eae26a49aea9ce7fb0ae5e74508fbd4f3531395e9e6f3704039ffcf08fb8e57e0adde8639c6e73c8fbb2385d1b43706ffb8706022e287098bc1d8bc730beb4659420ad39c1cda170c2d2a8c9cc6261dc88a756c74dda121a180a2fb782c0c8f8e73e8e84b5d45395e8b8cf579a97656812f303f143ac1b3b0f44fb41895975a2ee31acb98629b6989b494f927e9f84afc1b55f30d46d7de21bdda58e2bc61708304b2372a2f4563aaa94404c8516b0440dd347510961afa28fcd99b290c661ef6714cf0dd53fc70e8d5166db68a4e9757ff738fd862cb54e56f35dbb40be56ed3e72b8461512938f4e69b732591e8ccc262923a3de2ebe37acbdeadca7d43198bce1a5f522b260c9dba44f610a30dae163b6c3f93465d3dd6fecfc51592891dfdcb58bdc577c2fcf78f2fd383a06b0328e16609e6413392a6c114048bc2158d271fd591e9abd0560fbc7a16ebb62659806ab0ff1d1dc82b649d878af17f0dabff6cd7a3ca24599c745671b0bc02289017a4cafa3b265549b570458acf7db62fe2cb56a3c8a51af69547da3ce7a795cd3267e425d1598df9ac4a6eb0992fe7f7421770522fc72fab58f7a8b5f592e176d99f7a63f3b8e8655050dde079c55fb68c7caed182303e13187ccb3a916ed50042640b50775cb2ed317cb57acde05f82707141e2254f85cfd7927cc8191b334653a0bfb24323deb578a8367182097ffdc1719e366e5a96ae68c8548872057d80076ff3542898ec06688d4f34c8dca0e8a7a6ebbd55f4180dae328f65f76bf927ea4e1b6a9b68e4a4e864c4fdc687485f7dcd37f6ec88039adf37136f8abb756153c7dc5411c812ad75d698a552da16a408a70e4ae9ba05c4354a85cd93ed5401ff1301c08abe9499d6742679ac4a59093df52a04c02362e504d8f5173f0784b5e7532b79864faea5b86d034d47d3eeef103c3a8042ab709926d7d60b77bf4daf82b883e52fd0e9d12cfbf320e1022270eac187c6c039f146f1dd465689f01be1e6bcbcc30b44e3ef076730e4cf28c804e45c2fa4b312c63ba1c675dc63c52a5c9dc6644f29fc2ea68db1eb5e857a8bb64b06d8eae28987895fbcacfec3ed0dbfdbf6e7aecc8854beab42647e94d92473f2535fd0a72408d4dc7ffb06be1773f8e71a35c3202148fe7ce30e4471dcdacc0f16d27cbcc4a0d88b84d7e98faf540ac20f0774d9d86c7e65bee4ddecced401306d272f8037d4b067bacca94860882de074e6a19147f7dcc2040f9a5f1d0b51cc57d0c6374cba8c290647aa1a174e81eba4fe1145f3b508a619dc80da5495acd5bce4152456a6bd623384ee046d2c6e5ac03c579e0bd6d537ae62c88b856a4d1c595c4d09896d5e279eacb0220a933915b5bbc3ec1682a7b6376716d4401ffeac3c5f8468263b7836e1a4178b65f6fa6bc88200fd400b728610760e0c4bbd6c740d19941759a8879e3567e1f166f16455c569cba3caefd8da3c9c26c422a4993c89c86ade0b9b6d3b777cf6ec6ad966d8fea3d72d5a123a5191f9c9e61e99e46929fd5b13a5f11f91f9ab275fa4222d6dcec916a09b7a1881c1f55af20eac157c604675ce6f87d547ba4657e26a4edb7124c150c86c3d3d3db7ee9585e94830d3cb323c96aa54a50f526a06065944f69fe7c26c2f1bf0a3f0ed030e316377cb4e229aeb99498e9540ba89673b4fb6e874b211f6dd37031c94fad8d7c81b123516680b2511a4cf0c1fbc7bf5b6df8669601e19e60b9e2343d24d1858fa7c13d12f40ba7ce64ffb8780ab4ea61d58f50751d8b5e6d417cbf3e6392fecea7a550737a649c4ac6eda314a5d1ceece5afa4025f7f34964002ad582"}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VERDICT={0x3c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VERDICT={0x14, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}]}]}, {0x20, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x9}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0xed8}, @NFTA_SET_ELEM_EXPR={0x4}]}]}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}]}, @NFT_MSG_NEWTABLE={0x70, 0x0, 0xa, 0x301, 0x0, 0x0, {0x5, 0x0, 0x8}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}, @NFT_MSG_NEWSET={0x1fc, 0x9, 0xa, 0x101, 0x0, 0x0, {0xa, 0x0, 0x6}, [@NFTA_SET_DESC={0x1dc, 0x9, 0x0, 0x1, [@NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_SET_DESC_CONCAT={0x18c, 0x2, 0x0, 0x1, [{0x44, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x6}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7fff}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xc8}]}, {0x1c, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x42d}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x80000001}]}, {0xc, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x3}]}, {0x3c, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x800}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x519}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x9c748cf}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x5}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x3}]}, {0x2c, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x8001}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x990c}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7fff}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x8}]}, {0x54, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x5}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x10000}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x8001}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x5}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xc5}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x5}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x5}]}, {0x1c, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x800}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x6}]}, {0x44, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x6}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x1285}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x5}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x800}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x200}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xffffffff}]}]}, @NFTA_SET_DESC_CONCAT={0x44, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7}]}, {0x2c, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x3f}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x4}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_SET_FIELD_LEN={0x8}]}]}]}, @NFTA_SET_TIMEOUT={0xc, 0xb, 0x1, 0x0, 0x1}]}], {0x14}}, 0x3d34}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) sendmsg$NFT_MSG_GETRULE(r0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1020}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0xd0, 0x7, 0xa, 0x801, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_RULE_EXPRESSIONS={0x5c, 0x4, 0x0, 0x1, [{0x58, 0x1, 0x0, 0x1, [@tproxy={{0xb}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_TPROXY_REG_ADDR={0x8, 0x2, 0x1, 0x0, 0xf}, @NFTA_TPROXY_FAMILY={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_TPROXY_FAMILY={0x8, 0x1, 0x1, 0x0, 0xa}]}}, @connlimit={{0xe}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_CONNLIMIT_COUNT={0x8, 0x1, 0x1, 0x0, 0x5}, @NFTA_CONNLIMIT_COUNT={0x8, 0x1, 0x1, 0x0, 0xffff}, @NFTA_CONNLIMIT_COUNT={0x8, 0x1, 0x1, 0x0, 0x20}]}}]}]}, @NFTA_RULE_POSITION_ID={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_RULE_POSITION_ID={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_RULE_USERDATA={0x35, 0x7, 0x1, 0x0, "8da7dfe938f8b62c3e9c2ef982b0576278037c1c985463187c2a865e0ebbb7ee7502ed3d2246e985d22e6161853fe9fe36"}, @NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x2}]}, 0xd0}, 0x1, 0x0, 0x0, 0x88d4}, 0x4) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000200000000000000000a2c000000030a01020000000000000000050000000900010073797a30000000000c0002800800024000000000140000001100010000000200000000000a000000"], 0x54}}, 0x0) 07:51:46 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x11, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:46 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000019000000000000", 0x32) 07:51:46 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000507000000000000000006000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:46 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009505000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:46 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:46 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x7c, 0x3, 0x8, 0x201, 0x0, 0x0, {0x1, 0x0, 0x5}, [@CTA_TIMEOUT_DATA={0x3c, 0x4, 0x0, 0x1, @fccp=[@CTA_TIMEOUT_DCCP_OPEN={0x8, 0x4, 0x1, 0x0, 0x7ff}, @CTA_TIMEOUT_DCCP_CLOSING={0x8, 0x6, 0x1, 0x0, 0x400}, @CTA_TIMEOUT_DCCP_TIMEWAIT={0x8, 0x7, 0x1, 0x0, 0x7ff}, @CTA_TIMEOUT_DCCP_RESPOND={0x8, 0x2, 0x1, 0x0, 0x7}, @CTA_TIMEOUT_DCCP_CLOSING={0x8, 0x6, 0x1, 0x0, 0xfffffff8}, @CTA_TIMEOUT_DCCP_RESPOND={0x8, 0x2, 0x1, 0x0, 0x8}, @CTA_TIMEOUT_DCCP_CLOSING={0x8, 0x6, 0x1, 0x0, 0x7}]}, @CTA_TIMEOUT_DATA={0x2c, 0x4, 0x0, 0x1, @fccp=[@CTA_TIMEOUT_DCCP_RESPOND={0x8, 0x2, 0x1, 0x0, 0x401}, @CTA_TIMEOUT_DCCP_REQUEST={0x8, 0x1, 0x1, 0x0, 0x20000100}, @CTA_TIMEOUT_DCCP_PARTOPEN={0x8, 0x3, 0x1, 0x0, 0x675}, @CTA_TIMEOUT_DCCP_CLOSEREQ={0x8, 0x5, 0x1, 0x0, 0x9}, @CTA_TIMEOUT_DCCP_OPEN={0x8, 0x4, 0x1, 0x0, 0x7f}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0x20044841}, 0x40001) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000040)={r0, 0x7, 0x7, 0x6}) r2 = syz_io_uring_setup(0x5d0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x80, 0x0, r1}, &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eeb000/0x4000)=nil, &(0x7f0000000000), &(0x7f0000000340)) io_uring_enter(r2, 0x450e, 0x0, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_SET_CHANNEL(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f0000000240)={0x50, 0x0, 0x2, 0x70bd2b, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x800, 0x77}}}}, [@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x4}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x8}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x3c}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x100}]}, 0x50}, 0x1, 0x0, 0x0, 0x4014}, 0x8001) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[@ANYRESOCT=r0], 0x54}}, 0x0) 07:51:46 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00000000001a000000000000", 0x32) 07:51:46 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x12, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:47 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009506000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 2184.903278][T29190] device macvlan0 entered promiscuous mode [ 2184.915604][T29190] device macvlan0 left promiscuous mode 07:51:47 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:47 executing program 5: prctl$PR_GET_FP_MODE(0x2e) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x401, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x4}, @NFTA_CHAIN_HOOK={0xc, 0x2, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x26870c2b}]}]}, @NFT_MSG_NEWFLOWTABLE={0x34, 0x16, 0xa, 0x3, 0x0, 0x0, {0xc, 0x0, 0x1}, [@NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x6}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}], {0x14}}, 0x88}}, 0x0) 07:51:47 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00000000001b000000000000", 0x32) 07:51:47 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000507000000000000000007000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:47 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009507000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:47 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x25, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:47 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:47 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00000000001c000000000000", 0x32) 07:51:47 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x2, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x54}}, 0x0) ioctl$BTRFS_IOC_FS_INFO(r0, 0x8400941f, &(0x7f0000000500)) [ 2185.110651][T29320] device macvlan0 entered promiscuous mode [ 2185.123700][T29320] device macvlan0 left promiscuous mode 07:51:47 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000507000000000000000009000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:47 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009508000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:47 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x60, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:47 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00000000001d000000000000", 0x32) 07:51:47 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="394a0f7c390cb429aba027ac14d54d6300000064232f6b7eb23f4fce334c9042b6d27fa16b115dceb4a0aaae6a06ec66f193bc712b38c48008ab7018efe0d161720c98fa1d03782adfee5ef046c63c7492a5d996fca4121f433753854208cb684d539d552d4cf711dd2f871be05dd0f2afd2f70dd2d9e27f5e34a88cd5af7d0e9bf75551d3e78d661cd0e4b69850ae0bb172e7d45192f0ff539af8ec51460983a165b7b55662a7fa3f6f313eaa3760aa2c505396bb59a055ee885973ba3d769377a387b966a8d5f88fe61a6ffb974de7500a9bd1735d802bf29f532575e583af79ad4c3dfb5c5c0033d961b0b71c992a9154d0a85dbf6b2e0bd133ad3ea512ca4cb2", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:47 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$netlink(0x10, 0x3, 0x14) sendmsg$NFULNL_MSG_CONFIG(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x60, 0x1, 0x4, 0x201, 0x0, 0x0, {0xc, 0x0, 0x1}, [@NFULA_CFG_CMD={0x5, 0x1, 0x1}, @NFULA_CFG_QTHRESH={0x8}, @NFULA_CFG_MODE={0xa, 0x2, {0x7}}, @NFULA_CFG_MODE={0xa, 0x2, {0xfff}}, @NFULA_CFG_MODE={0xa, 0x2, {0xd516, 0x1}}, @NFULA_CFG_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0xdc13}, @NFULA_CFG_FLAGS={0x6}, @NFULA_CFG_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x4}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008080) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x24, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_HOOK={0x4, 0x2}]}], {0x14}}, 0x4c}}, 0x0) 07:51:47 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009509000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:47 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00000000001e000000000000", 0x32) [ 2185.329264][T29439] device macvlan0 entered promiscuous mode [ 2185.342512][T29439] device macvlan0 left promiscuous mode 07:51:47 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x2ba, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:47 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x2, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x54}}, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0x2, 0x6, 0x801, 0x0, 0x0, {0xc, 0x0, 0x7}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x9}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x10881}, 0x8001) socket$nl_netfilter(0x10, 0x3, 0xc) 07:51:47 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:47 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="400000001000050700000000000000000a000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:47 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a0000000000000500000000000000950a000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:47 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00000000001f000000000000", 0x32) 07:51:47 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000003b0c1781003f1357f1cf57ce82ad6ceb74f7b2da6e9a6f7540a903000000050008000900010073797a30000000000c000280080002400000000eab00000011"], 0x54}}, 0x0) 07:51:47 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:47 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x300, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:47 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a0000000000000500000000000000950b000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:47 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000020000000000000", 0x32) [ 2185.557828][T29571] device macvlan0 entered promiscuous mode [ 2185.567076][T29571] device macvlan0 left promiscuous mode 07:51:47 executing program 5: ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000000)) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x2, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x54}}, 0x0) 07:51:47 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:47 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="400000001000050700000000000000000b000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:47 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a0000000000000500000000000000950c000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:47 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x500, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:47 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000021000000000000", 0x32) 07:51:47 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x2, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x54}}, 0x0) sendmsg$NFQNL_MSG_VERDICT_BATCH(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="3400000003036f50c2ec000000000000fffffc000000010c000200c5b4fe4200000000000002000000020073f0401d2a001eea9082217cbcbc8ec964fe9e56d8125598dd4d244dc79c082131d6c792431a0a485125c59b"], 0x34}, 0x1, 0x0, 0x0, 0x20000040}, 0x4000050) 07:51:47 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:47 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a0000000000000500000000000000950d000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:47 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000022000000000000", 0x32) 07:51:47 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x600, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) [ 2185.825132][T29696] device macvlan0 entered promiscuous mode [ 2185.838426][T29696] device macvlan0 left promiscuous mode [ 2185.887751][T29706] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2185.908189][T29740] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.5'. 07:51:48 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a0000000000000500000000000000950e000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:48 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="400000001000050700000000000000000c000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:48 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:48 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000023000000000000", 0x32) 07:51:48 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000000)=ANY=[], 0x54}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x9c}, 0x1, 0x0, 0x0, 0x40}, 0x84) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='blkio.bfq.time_recursive\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$TIPC_NL_KEY_FLUSH(r1, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x14, 0x0, 0x400, 0x70bd29, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x24004010}, 0x44050) sendmsg$ETHTOOL_MSG_DEBUG_SET(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000400)={0x20, r3, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_DEBUG_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x20}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x68, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x68}}, 0x40408c4) sendmsg$ETHTOOL_MSG_EEE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r3, 0x400, 0x70bd2d, 0x25dfdbfd, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c010}, 0x4040) sendmsg$NFT_MSG_GETRULE(r1, 0xfffffffffffffffc, 0x20040804) 07:51:48 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x700, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:48 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}]}], {0x14}}, 0x54}}, 0x0) 07:51:48 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009510000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:48 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x18, 0x0, &(0x7f0000004000)) r1 = accept4(r0, 0x0, &(0x7f00000000c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r4, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r4, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r4, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r4, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r4, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:48 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000024000000000000", 0x32) [ 2186.100553][T29830] device macvlan0 entered promiscuous mode [ 2186.113683][T29830] device macvlan0 left promiscuous mode 07:51:48 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x900, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:48 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x3}, @NFTA_CHAIN_HOOK={0xc, 0x2, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x54}}, 0x0) 07:51:48 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="400000001000050700000000000000010c000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:48 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009511000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:48 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x18, 0x0, &(0x7f0000004000)) r1 = accept4(r0, 0x0, &(0x7f00000000c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r4, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r4, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r4, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="394a0f7c390cb429aba027ac14d54d6300000064232f6b7eb23f4fce334c9042b6d27fa16b115dceb4a0aaae6a06ec66f193bc712b38c48008ab7018efe0d161720c98fa1d03782adfee5ef046c63c7492a5d996fca4121f433753854208cb684d539d552d4cf711dd2f871be05dd0f2afd2f70dd2d9e27f5e34a88cd5af7d0e9bf75551d3e78d661cd0e4b69850ae0bb172e7d45192f0ff539af8ec51460983a165b7b55662a7fa3f6f313eaa3760aa2c505396bb59a055ee885973ba3d769377a387b966a8d5f88fe61a6ffb974de7500a9bd1735d802bf29f532575e583af79ad4c3dfb5c5c0033d961b0b71c992a9154d0a85dbf6b2e0bd133ad3ea512ca4cb2", @ANYRES16=r4, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r4, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:48 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000025000000000000", 0x32) 07:51:48 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0xa00, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:48 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000000)=ANY=[], 0x80}, 0x1, 0x0, 0x0, 0x20004012}, 0x0) 07:51:48 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009512000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:48 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x18, 0x0, &(0x7f0000004000)) r1 = accept4(r0, 0x0, &(0x7f00000000c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r4, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r4, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r4, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r4, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r4, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) [ 2186.324804][T29957] device macvlan0 entered promiscuous mode [ 2186.342190][T29957] device macvlan0 left promiscuous mode 07:51:48 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000026000000000000", 0x32) 07:51:48 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="400000001000050700000000000000000d000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:48 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009518000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:48 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x2, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x54}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4146000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x3, 0x2, 0x3, 0x0, 0x0, {0x3, 0x0, 0x3}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x40000) 07:51:48 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0xb00, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:48 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000027000000000000", 0x32) 07:51:48 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009525000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:48 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:48 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0xc00, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:48 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, &(0x7f0000000040)=""/147, 0x93, 0x0, &(0x7f0000000500)=""/4096, 0x1000}, &(0x7f0000000140)=0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a2c000000030a0102000000000000000005000000090001007300028008000240b79ad20ca347000000001400000011000100"/82], 0x54}}, 0x0) [ 2186.542405][T30078] device macvlan0 entered promiscuous mode [ 2186.563091][T30078] device macvlan0 left promiscuous mode 07:51:48 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="400000001000050700000000000000000e000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:48 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000028000000000000", 0x32) 07:51:48 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009548000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:48 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:48 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0xd00, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:48 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWCHAIN={0x64, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_HOOK={0x44, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'veth0_to_batadv\x00'}, @NFTA_HOOK_DEV={0x14, 0x3, 'erspan0\x00'}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x4}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x2}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x2}]}], {0x14}}, 0x8c}}, 0x0) [ 2186.724272][T30202] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2186.735879][T30203] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 07:51:48 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000029000000000000", 0x32) [ 2186.778596][T30206] device macvlan0 entered promiscuous mode [ 2186.785565][T30206] device macvlan0 left promiscuous mode 07:51:48 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="400000001000050700000000000000030e000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:48 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:48 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a0000000000000500000000000000954c000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:48 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0xe00, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:48 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)={0xd0, r1, 0x521, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x38, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'lc\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@broadcast}]}, @IPVS_CMD_ATTR_SERVICE={0x48, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'lc\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1, 0x4}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x33}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x551}, @IPVS_SVC_ATTR_PE_NAME={0x8}]}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xffff}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0xff}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e21}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e23}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x4000800}, 0x4000053) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x2, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x54}}, 0x0) 07:51:48 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00000000002a000000000000", 0x32) 07:51:49 executing program 0: ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="394a0f7c390cb429aba027ac14d54d6300000064232f6b7eb23f4fce334c9042b6d27fa16b115dceb4a0aaae6a06ec66f193bc712b38c48008ab7018efe0d161720c98fa1d03782adfee5ef046c63c7492a5d996fca4121f433753854208cb684d539d552d4cf711dd2f871be05dd0f2afd2f70dd2d9e27f5e34a88cd5af7d0e9bf75551d3e78d661cd0e4b69850ae0bb172e7d45192f0ff539af8ec51460983a165b7b55662a7fa3f6f313eaa3760aa2c505396bb59a055ee885973ba3d769377a387b966a8d5f88fe61a6ffb974de7500a9bd1735d802bf29f532575e583af79ad4c3dfb5c5c0033d961b0b71c992a9154d0a85dbf6b2e0bd133ad3ea512ca4cb2", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:49 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009568000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:49 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x801, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x2, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x7560a5e}]}]}], {0x14}}, 0x54}}, 0x0) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, 0x0, 0x400, 0x70bd2d, 0x25dfdbff, {}, [@IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xffff}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0xa841) sendmsg$NFT_MSG_GETTABLE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, 0x1, 0xa, 0x201, 0x0, 0x0, {0xc, 0x0, 0x8}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x20}}, 0x40) 07:51:49 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0xf00, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) [ 2186.985609][T30329] device macvlan0 entered promiscuous mode [ 2187.006243][T30329] device macvlan0 left promiscuous mode 07:51:49 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00000000002b000000000000", 0x32) 07:51:49 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000507000000000000000011000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:49 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a0000000000000500000000000000956c000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:49 executing program 0: ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:49 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = open(&(0x7f0000000000)='./file0\x00', 0x804c0, 0x2) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000080)={&(0x7f0000000500)={{0x14}, [@NFT_MSG_DELOBJ={0x2c, 0x14, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x3}, [@NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz1\x00'}]}, @NFT_MSG_DELRULE={0x139c, 0x8, 0xa, 0x801, 0x0, 0x0, {0xa, 0x0, 0xa}, [@NFTA_RULE_EXPRESSIONS={0xc3c, 0x4, 0x0, 0x1, [{0x8f4, 0x1, 0x0, 0x1, [@flow_offload={{0x11}, @void}, @log={{0x8}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_LOG_QTHRESHOLD={0x6, 0x4, 0x1, 0x0, 0x2}]}}, @payload={{0xc}, @void}, @synproxy={{0xd}, @val={0x34, 0x2, 0x0, 0x1, [@NFTA_SYNPROXY_WSCALE={0x5, 0x2, 0x1}, @NFTA_SYNPROXY_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SYNPROXY_MSS={0x6, 0x1, 0x1, 0x0, 0x7}, @NFTA_SYNPROXY_MSS={0x6, 0x1, 0x1, 0x0, 0x7f}, @NFTA_SYNPROXY_MSS={0x6, 0x1, 0x1, 0x0, 0x229}, @NFTA_SYNPROXY_MSS={0x6, 0x1, 0x1, 0x0, 0xff}]}}, @counter={{0xc}, @void}, @counter={{0xc}, @void}, @range={{0xa}, @val={0x7e8, 0x2, 0x0, 0x1, [@NFTA_RANGE_SREG={0x8, 0x1, 0x1, 0x0, 0xe}, @NFTA_RANGE_TO_DATA={0x64, 0x4, 0x0, 0x1, [@NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VALUE={0x53, 0x1, "604a42a70186b2fc29be2131600db0633c59957ee7c378490913ae3b915a262f52e1977b6d272732d0790acf03553a09c90f68607aa1af688a21f87a4219a48699ed720d962516663d97f35259d528"}]}, @NFTA_RANGE_TO_DATA={0x244, 0x4, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x4}, @NFTA_DATA_VALUE={0xc6, 0x1, "f7f2f80a342dc369a723d5ab9ad217781acb7a9c95cc4ec15f2a9dd34dac1580d49a47fb0df31b237f08c41590490761a4aa0f33f60b29416d97405d8a855eb5acd1adda13ab73521f0777bc85cb6923be38971afdc10863e93dcf37f1fb79d3d12533e7d423bfdbd67e043ba2fb59011483f9e7621867c6a6ff073a8b137fc741eafdc2ee3c643be36359493d3d2a9c212ea9686a038389cf8b94087bb8766bc5c37f978c3b08da7ad5ff6fee80f7d80076c5e43a430e827300b7bcfeeeb6e62c3f"}, @NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x38, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}, @NFTA_DATA_VALUE={0x52, 0x1, "55d85036467ad75b35524613050ec2252177c2ef2c1639d6182eb271ad1ef96e736d9585d4fedfd3b7ff4bc8cbb8417213fc2f8c6ea04283fbac18362f4118b826fea875857e938429e74a969e38"}, @NFTA_DATA_VALUE={0x4}, @NFTA_DATA_VALUE={0xc3, 0x1, "9c5d2e05782a4978749f535ca24f5cab7c6f9418e412c1d57119fe8236e8fac4d7315733cc402957c87f4e94f1ac07114acaee2c13e0f19c7183999e6994d324cd4b6736a1ae73b03536b3859e98506fd759056e6bb3d155ee1b9ae4731765036dac3fd8770e236001d417b5f580441c5e21bc23855368d61c009c4c0414fc8b09600a5f2d304d39eb0f6515dfd92ef16292d6035e42945444f8815526fe964fb2b1ef37f889e332e381c8c755650e73e7cf97b9f4fd767d0b20af5149dbb0"}]}, @NFTA_RANGE_SREG={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_RANGE_TO_DATA={0x2a8, 0x4, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VERDICT={0x64, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}]}, @NFTA_DATA_VALUE={0xf1, 0x1, "ec57bd4f277ec70ff03c024309595c0dbc46af70a8df324778b37c76cff60b19bd152bd08362082ad5e95585ae52d18f640da6f6f37e4e0ac46e4f86b43bee289af151835a53edd0831b98fcee22d57086962d4457a901c6b3735f43652e61f232aae03d8dcb248d88d7f2a6a795a5c8bc8b6751cde0a1ec693827b4c00ed50360d106f2d857ba3ea15117c745af3e5415b47c7bf1c0104d096b6385b8032e8b541779820fd1082fad866ca4ff0914fa7db9fd41c32b678487bc8c474e1ba97df18e21497502a02eced8634d09c8ba51ef871e759236e7429e6e4e1d580f067a08e44a73c584be88cb1eccc7ed"}, @NFTA_DATA_VERDICT={0x3c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xdacbf4ebfaae7b47}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0x4}, @NFTA_DATA_VALUE={0xfb, 0x1, "ea6d775cf1fc4e8a9043a45fc16ebb31df9d769d8b56cc3ee85824aa0424f8f779533de2eed911de3e84466ec11873380092598db2fb7159be6a4b6d5f9c8b7641f00a3bde92fa200dfa44f4ab2bb9de057f2448754045fe3a9be159b3b80382505f196e5e6746ad6d54cfa860f747c36d10f74033622a2355ba192229baca371f706a6d389d6df9aecf70769a3e32575c9784a36c414b0d29f609c35e4b235997d2c1a89bad63fb83abe3f1b41f7960e2c3221c5ccf5eeeb9e73f39d065c92f7026d051cfe520656b897ccb1a0a7e78bbff482aed773e90fd3dbd14f2d974930f27c1f435355185896a417b291a61822e2c10aeae0e95"}]}, @NFTA_RANGE_FROM_DATA={0x15c, 0x3, 0x0, 0x1, [@NFTA_DATA_VALUE={0x13, 0x1, "8b2c61c17865c9adc60c6a14da613c"}, @NFTA_DATA_VALUE={0x32, 0x1, "66ef2ce4a676d2a98acd05d2757b5efb38d713a2b8e1aa4f0c63bec0355f5242feca954296953fdf82283d949d96"}, @NFTA_DATA_VALUE={0x1d, 0x1, "bb163ecfd2eef56d810bd59d14dd222514770d34e4b4eed4aa"}, @NFTA_DATA_VALUE={0x4b, 0x1, "42d74c32070e46beaea02299566f475ea65302b3e5184788a8f42e55389aa9ece75d7ad3bc91eb93d0aed366fe602c59b0ae036663c0df33892a4b02e614c9b45e5a913eed0fc2"}, @NFTA_DATA_VERDICT={0x50, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x48, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}]}, @NFTA_RANGE_TO_DATA={0x128, 0x4, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x54, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0x5}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VERDICT={0x24, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0x2e, 0x1, "806184a19d7a347794f38dcd676b75ebe5aaa0165aef9faff604f45a47fa0549fe82f6cfae40ce870b5a"}, @NFTA_DATA_VALUE={0x48, 0x1, "683f047cfe6b900120b0aa0d121295c03d6fdc3f58ddaf57f0bc2bfc12cd11cf47c7fa740e4b8c2f626c1d8f8e75f5c89488a34ac2f376cdc27b2af99e3c0e426f45aae6"}, @NFTA_DATA_VALUE={0x33, 0x1, "177a994bfa77d8ccdc744fb6a54b61795a0940a96b8d9d527223ec2d166582cefb3cd45f37c422a633542c8ea5d634"}]}]}}, @xfrm={{0x9}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_XFRM_DIR={0x5, 0x3, 0x1}, @NFTA_XFRM_KEY={0x8, 0x2, 0x1, 0x0, 0x3}, @NFTA_XFRM_KEY={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_XFRM_KEY={0x8}]}}, @connlimit={{0xe}, @val={0x2c, 0x2, 0x0, 0x1, [@NFTA_CONNLIMIT_FLAGS={0x8}, @NFTA_CONNLIMIT_COUNT={0x8, 0x1, 0x1, 0x0, 0x7fff}, @NFTA_CONNLIMIT_FLAGS={0x8}, @NFTA_CONNLIMIT_COUNT={0x8, 0x1, 0x1, 0x0, 0x5}, @NFTA_CONNLIMIT_COUNT={0x8, 0x1, 0x1, 0x0, 0x26e}]}}]}, {0xcc, 0x1, 0x0, 0x1, [@counter={{0xc}, @val={0x58, 0x2, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x80000001}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x6}, @NFTA_COUNTER_BYTES={0xc}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x9}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x8}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x4}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x1}]}}, @connlimit={{0xe}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_CONNLIMIT_COUNT={0x8, 0x1, 0x1, 0x0, 0x9e}]}}, @notrack={{0xc}, @val={0x4, 0x2, 0x0, 0x1, [""]}}, @payload={{0xc}, @val={0x2c, 0x2, 0x0, 0x1, [@NFTA_PAYLOAD_BASE={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_PAYLOAD_DREG={0x8, 0x1, 0x1, 0x0, 0x1a}, @NFTA_PAYLOAD_LEN={0x8, 0x4, 0x1, 0x0, 0x4}, @NFTA_PAYLOAD_DREG={0x8, 0x1, 0x1, 0x0, 0x9}, @NFTA_PAYLOAD_CSUM_TYPE={0x8, 0x6, 0x1, 0x0, 0x1}]}}]}, {0x278, 0x1, 0x0, 0x1, [@bitwise={{0xc}, @val={0x1ac, 0x2, 0x0, 0x1, [@NFTA_BITWISE_DREG={0x8, 0x2, 0x1, 0x0, 0xe}, @NFTA_BITWISE_DREG={0x8, 0x2, 0x1, 0x0, 0xc}, @NFTA_BITWISE_MASK={0x198, 0x4, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x40, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VALUE={0x9, 0x1, "8febfb6873"}, @NFTA_DATA_VALUE={0x63, 0x1, "3538ec064b42782972b97cff2e3b0a3c33e5cbd9d4bcdb853ad6f861fed4d8a6649d29cb638cec0f7ea6445f1d0c71bc83189d464ef734e40c3ae7b16607f9a6232324e373b038ce7793ed5a3a7e9f6e9a058b9ebbf6956ac8122b1cc9eb75"}, @NFTA_DATA_VERDICT={0x44, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VERDICT={0x64, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0x3}]}, @NFTA_DATA_VALUE={0x8, 0x1, "537442d9"}, @NFTA_DATA_VERDICT={0x18, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}]}]}}, @meta={{0x9}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_META_KEY={0x8, 0x2, 0x1, 0x0, 0xc}]}}, @redir={{0xa}, @val={0x2c, 0x2, 0x0, 0x1, [@NFTA_REDIR_REG_PROTO_MIN={0x8, 0x1, 0x1, 0x0, 0x17}, @NFTA_REDIR_FLAGS={0x8, 0x3, 0x1, 0x0, 0xc}, @NFTA_REDIR_REG_PROTO_MAX={0x8}, @NFTA_REDIR_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2a}, @NFTA_REDIR_FLAGS={0x8}]}}, @osf={{0x8}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_OSF_FLAGS={0x8}, @NFTA_OSF_DREG={0x8, 0x1, 0x1, 0x0, 0x8}, @NFTA_OSF_DREG={0x8, 0x1, 0x1, 0x0, 0xf}, @NFTA_OSF_FLAGS={0x8}]}}, @reject={{0xb}, @void}, @ct={{0x7}, @void}, @dup={{0x8}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0xd}, @NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0x15}, @NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0x16}, @NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0x3}]}}]}]}, @NFTA_RULE_HANDLE={0xc, 0x3, 0x1, 0x0, 0x3}, @NFTA_RULE_POSITION_ID={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_RULE_USERDATA={0x9e, 0x7, 0x1, 0x0, "b6e5edea27afb045ca67028c0b5dfb6d96564888ff1209974ab8d99d82f7dc2cbe3ea163da83ce32ec8d5de220d1e5ab08218924d731adcf11a63351f60ca6a03f7e2fec17dd62fdf85db0ade60d682bcf4de63d8068ef9e43c307645a1fed2884926b3969fcd7c8b3fc017b30ee9ea554472357179a0bf08777808040a3061dd6678b8bdec300806a471b066f7c08fcdd17f62995e47e664294"}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_RULE_EXPRESSIONS={0x674, 0x4, 0x0, 0x1, [{0x58, 0x1, 0x0, 0x1, [@log={{0x8}, @void}, @dup_ipv4={{0x8}, @void}, @log={{0x8}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_LOG_FLAGS={0x8, 0x6, 0x1, 0x0, 0x1b}, @NFTA_LOG_LEVEL={0x8, 0x5, 0x1, 0x0, 0x6}, @NFTA_LOG_GROUP={0x6, 0x1, 0x1, 0x0, 0x2}]}}, @rt={{0x7}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_RT_KEY={0x8, 0x2, 0x1, 0x0, 0x2}]}}, @exthdr={{0xb}, @void}]}, {0x88, 0x1, 0x0, 0x1, [@bitwise={{0xc}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_BITWISE_DREG={0x8, 0x2, 0x1, 0x0, 0x8}, @NFTA_BITWISE_SREG={0x8, 0x1, 0x1, 0x0, 0x16}, @NFTA_BITWISE_SREG={0x8, 0x1, 0x1, 0x0, 0xe}, @NFTA_BITWISE_SREG={0x8, 0x1, 0x1, 0x0, 0xd}]}}, @exthdr={{0xb}, @void}, @osf={{0x8}, @void}, @immediate={{0xe}, @void}, @meta={{0x9}, @void}, @cmp={{0x8}, @val={0x4}}, @xfrm={{0x9}, @void}, @notrack={{0xc}, @void}]}, {0x2b0, 0x1, 0x0, 0x1, [@osf={{0x8}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_OSF_DREG={0x8, 0x1, 0x1, 0x0, 0xb}, @NFTA_OSF_DREG={0x8, 0x1, 0x1, 0x0, 0x15}, @NFTA_OSF_TTL={0x5, 0x2, 0x40}, @NFTA_OSF_TTL={0x5, 0x2, 0x1}]}}, @connlimit={{0xe}, @val={0x34, 0x2, 0x0, 0x1, [@NFTA_CONNLIMIT_FLAGS={0x8}, @NFTA_CONNLIMIT_FLAGS={0x8}, @NFTA_CONNLIMIT_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_CONNLIMIT_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_CONNLIMIT_COUNT={0x8, 0x1, 0x1, 0x0, 0x80000001}, @NFTA_CONNLIMIT_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}}, @dynset={{0xb}, @val={0x94, 0x2, 0x0, 0x1, [@NFTA_DYNSET_FLAGS={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_DYNSET_SREG_DATA={0x8, 0x5, 0x1, 0x0, 0x6}, @NFTA_DYNSET_EXPR={0x70, 0x7, 0x0, 0x1, {{0xb}, @val={0x60, 0x2, 0x0, 0x1, [@NFTA_LOOKUP_DREG={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_LOOKUP_SREG={0x8, 0x2, 0x1, 0x0, 0x8}, @NFTA_LOOKUP_SET={0x9, 0x1, 'syz0\x00'}, @NFTA_LOOKUP_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFTA_LOOKUP_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFTA_LOOKUP_SET={0x9, 0x1, 'syz1\x00'}, @NFTA_LOOKUP_SREG={0x8, 0x2, 0x1, 0x0, 0xd}, @NFTA_LOOKUP_SET_ID={0x8}, @NFTA_LOOKUP_SET={0x9, 0x1, 'syz0\x00'}, @NFTA_LOOKUP_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}]}}}, @NFTA_DYNSET_SREG_DATA={0x8, 0x5, 0x1, 0x0, 0xa}, @NFTA_DYNSET_OP={0x8, 0x3, 0x1, 0x0, 0x2}]}}, @osf={{0x8}, @void}, @log={{0x8}, @val={0x38, 0x2, 0x0, 0x1, [@NFTA_LOG_SNAPLEN={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_LOG_PREFIX={0x5, 0x2, 0x1, 0x0, '\x00'}, @NFTA_LOG_LEVEL={0x8, 0x5, 0x1, 0x0, 0x4}, @NFTA_LOG_FLAGS={0x8, 0x6, 0x1, 0x0, 0x28}, @NFTA_LOG_PREFIX={0x9, 0x2, 0x1, 0x0, 'syz0\x00'}, @NFTA_LOG_QTHRESHOLD={0x6, 0x4, 0x1, 0x0, 0xce65}]}}, @byteorder={{0xe}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_BYTEORDER_SREG={0x8, 0x1, 0x1, 0x0, 0x17}, @NFTA_BYTEORDER_OP={0x8, 0x3, 0x1, 0x0, 0x1}]}}, @cmp={{0x8}, @val={0x128, 0x2, 0x0, 0x1, [@NFTA_CMP_OP={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_CMP_DATA={0x114, 0x3, 0x0, 0x1, [@NFTA_DATA_VALUE={0x75, 0x1, "2bde76a4184303ec41156cf4e6e8d73c8ecd6f79d7a319f3cb07effe04495b32cb866bb6caad61ebc42f9f03bffef955da848b6e92a02f2de840ddc3076e1fb5a379d60276616299bf14e3e83d8f4f77b9f6d131d9d4467383d6e2734ac32847f6fee53f8eff78a7358f37d5a639ba3059"}, @NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0x7b, 0x1, "416482a7cd15c67aa233f6b8aa6ab800e223e937bb97ced068ac6753e99b54773bbf481825adabf6bfdf442770db637a86f05f94dafc8c2f5290235d9b74c7fc013a872a5dcc54db72573db3afed65d1c34e603345d3f470659ac693f5dceacc5d1a849b989affc829f6b8e5febe2874d4cf3678cbe82f"}]}, @NFTA_CMP_SREG={0x8, 0x1, 0x1, 0x0, 0xd}]}}]}, {0xac, 0x1, 0x0, 0x1, [@dup={{0x8}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0x15}, @NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0xf}]}}, @bitwise={{0xc}, @void}, @hash={{0x9}, @void}, @fib={{0x8}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_FIB_FLAGS={0x8, 0x3, 0x1, 0x0, 0x33}, @NFTA_FIB_FLAGS={0x8}]}}, @tunnel={{0xb}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_TUNNEL_DREG={0x8, 0x2, 0x1, 0x0, 0x9}]}}, @masq={{0x9}, @void}, @flow_offload={{0x11}, @void}, @redir={{0xa}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_REDIR_FLAGS={0x8, 0x3, 0x1, 0x0, 0x14}, @NFTA_REDIR_FLAGS={0x8, 0x3, 0x1, 0x0, 0x32}]}}]}, {0x94, 0x1, 0x0, 0x1, [@target={{0xb}, @void}, @rt={{0x7}, @val={0x44, 0x2, 0x0, 0x1, [@NFTA_RT_DREG={0x8, 0x1, 0x1, 0x0, 0x8}, @NFTA_RT_KEY={0x8}, @NFTA_RT_KEY={0x8, 0x2, 0x1, 0x0, 0x3}, @NFTA_RT_DREG={0x8, 0x1, 0x1, 0x0, 0xe}, @NFTA_RT_DREG={0x8, 0x1, 0x1, 0x0, 0x8}, @NFTA_RT_KEY={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_RT_KEY={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_RT_DREG={0x8, 0x1, 0x1, 0x0, 0xe}]}}, @payload={{0xc}, @void}, @dup={{0x8}, @void}, @masq={{0x9}, @void}, @log={{0x8}, @val={0x4}}, @range={{0xa}, @void}]}, {0x1a0, 0x1, 0x0, 0x1, [@synproxy={{0xd}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_SYNPROXY_WSCALE={0x5, 0x2, 0xfd}]}}, @tunnel={{0xb}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_TUNNEL_DREG={0x8, 0x2, 0x1, 0x0, 0x15}, @NFTA_TUNNEL_MODE={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_TUNNEL_MODE={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_TUNNEL_MODE={0x8}]}}, @match={{0xa}, @void}, @reject={{0xb}, @val={0x4}}, @tproxy={{0xb}, @void}, @cmp={{0x8}, @val={0xa0, 0x2, 0x0, 0x1, [@NFTA_CMP_SREG={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_CMP_DATA={0x38, 0x3, 0x0, 0x1, [@NFTA_DATA_VALUE={0x2d, 0x1, "fbb7e1a273d74158db082c76794d16b934f4a8c90326df6bfe2a2aa3417c1678215e6a444be45c6f04"}, @NFTA_DATA_VERDICT={0x4}]}, @NFTA_CMP_DATA={0x5c, 0x3, 0x0, 0x1, [@NFTA_DATA_VALUE={0x27, 0x1, "76fcc4ec7b39cda00e69d842bf2c6833b9c0aeae10d89320ab0336101d50465d0d6928"}, @NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}]}]}}, @byteorder={{0xe}, @val={0x54, 0x2, 0x0, 0x1, [@NFTA_BYTEORDER_OP={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_BYTEORDER_SIZE={0x8, 0x5, 0x1, 0x0, 0xf7}, @NFTA_BYTEORDER_OP={0x8}, @NFTA_BYTEORDER_DREG={0x8, 0x2, 0x1, 0x0, 0xf13cf55b686ae51e}, @NFTA_BYTEORDER_SIZE={0x8, 0x5, 0x1, 0x0, 0xa4}, @NFTA_BYTEORDER_DREG={0x8, 0x2, 0x1, 0x0, 0x12}, @NFTA_BYTEORDER_SREG={0x8, 0x1, 0x1, 0x0, 0x12}, @NFTA_BYTEORDER_OP={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_BYTEORDER_LEN={0x8, 0x4, 0x1, 0x0, 0x9d}, @NFTA_BYTEORDER_OP={0x8}]}}, @immediate={{0xe}, @void}, @objref={{0xb}, @void}]}]}, @NFTA_RULE_HANDLE={0xc, 0x3, 0x1, 0x0, 0x4}]}, @NFT_MSG_NEWSETELEM={0x2c, 0xc, 0xa, 0x5, 0x0, 0x0, {0x0, 0x0, 0x5}, [@NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}]}, @NFT_MSG_DELTABLE={0x44, 0x2, 0xa, 0x401, 0x0, 0x0, {0xc, 0x0, 0x9}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}], {0x14}}, 0x1460}, 0x1, 0x0, 0x0, 0x48000}, 0x4000) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x2, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x54}}, 0x0) 07:51:49 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00000000002c000000000000", 0x32) 07:51:49 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x1100, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:49 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009574000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:49 executing program 0: ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="394a0f7c390cb429aba027ac14d54d6300000064232f6b7eb23f4fce334c9042b6d27fa16b115dceb4a0aaae6a06ec66f193bc712b38c48008ab7018efe0d161720c98fa1d03782adfee5ef046c63c7492a5d996fca4121f433753854208cb684d539d552d4cf711dd2f871be05dd0f2afd2f70dd2d9e27f5e34a88cd5af7d0e9bf75551d3e78d661cd0e4b69850ae0bb172e7d45192f0ff539af8ec51460983a165b7b55662a7fa3f6f313eaa3760aa2c505396bb59a055ee885973ba3d769377a387b966a8d5f88fe61a6ffb974de7500a9bd1735d802bf29f532575e583af79ad4c3dfb5c5c0033d961b0b71c992a9154d0a85dbf6b2e0bd133ad3ea512ca4cb2", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:49 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='maps\x00') lseek(r1, 0x200, 0x0) read$char_usb(r1, &(0x7f0000000200)=""/106, 0x6a) getpeername$netlink(r1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(r1, 0xf504, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a2c000000030a01020000000000000000050000000900010073797a30000000000c0002800800024000000000b302ef66f34063d8eda6df140000001100010000100000000000000000000a"], 0x54}}, 0x0) [ 2187.254201][T30461] device macvlan0 entered promiscuous mode [ 2187.262817][T30461] device macvlan0 left promiscuous mode 07:51:49 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00000000002d000000000000", 0x32) 07:51:49 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000507000000000000000012000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:49 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a0000000000000500000000000000957a000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:49 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x1200, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:49 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, 0x0, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:49 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='maps\x00') lseek(r1, 0x200, 0x0) read$char_usb(r1, &(0x7f0000000200)=""/106, 0x6a) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000280)) r2 = dup(r0) sendmsg$NFT_BATCH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a2c000000030a010200000000000000000500001e5c00010073797a30000000000c0002800880024000000000140000001100010000000000000000000000000a5e55877d7b7a15e97a9c4c04cd99d955d626de9fbdda519b54fdb7e635f8e9677a8e14a43c434123be469b6e360f39"], 0x54}, 0x1, 0x0, 0x0, 0x805}, 0x0) 07:51:49 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00000000002e000000000000", 0x32) 07:51:49 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a0000000000000500000000000000958a000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:49 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x2500, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) [ 2187.455055][T30583] device macvlan0 entered promiscuous mode [ 2187.466039][T30583] device macvlan0 left promiscuous mode 07:51:49 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, 0x0, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:49 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='maps\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000140)='maps\x00') lseek(r2, 0x200, 0x0) read$char_usb(r2, &(0x7f0000000200)=""/106, 0x6a) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f0000000080)={{0x2, 0x4e20, @private=0xa010102}, {0x6}, 0x2, {0x2, 0x4e23, @multicast2}, 'bond_slave_0\x00'}) lseek(r1, 0x203, 0x3) read$char_usb(r1, &(0x7f0000000200)=""/106, 0x6a) sendmsg$NFNL_MSG_ACCT_DEL(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)={0x80, 0x3, 0x7, 0x101, 0x0, 0x0, {0x9, 0x0, 0x5}, [@NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x3}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x6}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x8}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x3}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x6}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x5}, @NFACCT_NAME={0x9, 0x1, 'syz0\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x200}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x3}]}, 0x80}, 0x1, 0x0, 0x0, 0x8800}, 0xc4) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000300)="928feb3e9a223b7a574efe9314e0832600cb4e2eebe1c1369a11c8474baf162af9f4474d266c23194cd126bd68e69b0b07d43f8a16571276bda5a21cadcca13d5fb616d38eea41abb4a516d131212ccf170581f2", 0x54}, {&(0x7f0000000380)="e2f5e534035350ee764eed6d4391dd4dcd373769b7368b95cf312120a69452bbad1444855b8aeeb427f1cb8747fa9ba8e210338f83919885dc739c5e146ac6ac9579bdeeaa75435542241f9af3ab1defdc75a36d4e4e682d71c2f9abf881d82c00a3301014a24be74b45c0dbb7bdea515c67db45409bf7cf205954d54f687d951587b3047531c71cef7103678aac27ec8903162a5b530f29dde1da041c0cd8ec5cff37e412daf7cf93ab19c1ab2e", 0xae}, {&(0x7f00000004c0)="05df7509ca863096d779fbf2ff1a198a313254a673270bfb21a5e5b198089ec1aef409b7e234924338dac17c4fedf90ab2bf7d303c0a041af847996f67ea344984272f78fb268ab6c21f7f7c1648a39614c912c5c27852732c857c2b4fbc8fe9a99ff36ca41b7503f0c5e7", 0x6b}, {&(0x7f0000000540)="5402d725ecef90306f7783e4f923dd6fe9803190601eea92c8b249f4ef2a71ab0bf88472287db398a0afac6a326bcd9c51cb89c6a6b42769bb12849714d657112419d2d3387addf5d6e50eb43aac993c8cccd077515212b5cf43af44841d6b6c8563da48c9fa60deec8b7e233fe6dda9709a051365d0530f93d73ecfa4602ab6d29bbe613f5d035eebc4355150ac2ea5116137878624393e726be7830f9edd55bd43afbda148f2399947a049f241", 0xae}], 0x4) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)=ANY=[], 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x40) 07:51:49 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000507000000000000000112000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) [ 2187.533613][T30619] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2187.546024][T30689] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 07:51:49 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00000000002f000000000000", 0x32) 07:51:49 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a000000000000050000000000000095e5010000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:49 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, 0x0, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:49 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x4788, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:49 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x80}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x2, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x54}}, 0x0) 07:51:49 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000030000000000000", 0x32) [ 2187.684447][T30711] device macvlan0 entered promiscuous mode [ 2187.694949][T30711] device macvlan0 left promiscuous mode 07:51:49 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a0000000000000500000000000000951a020000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:49 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000507000000000000000020000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:49 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:49 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x4888, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:49 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000031000000000000", 0x32) 07:51:49 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009500030000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:49 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x0, 0xffffffffffffffff}}, './file0\x00'}) sendmsg$IPCTNL_MSG_CT_GET(r1, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x7c, 0x1, 0x1, 0x101, 0x0, 0x0, {0x1, 0x0, 0x9}, [@CTA_TUPLE_ORIG={0x58, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @multicast2}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_ID={0x8, 0xc, 0x1, 0x0, 0x1}, @CTA_MARK_MASK={0x8}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4080}, 0x10) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x2, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x54}, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000540)={0xffffffffffffffff}) r5 = socket(0xf, 0xa, 0x6) sendmsg$nl_netfilter(r4, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)={0x100, 0x16, 0x2, 0x801, 0x70bd26, 0x25dfdbfd, {0xa, 0x0, 0x1}, [@generic="b8f1e1c45555a89e55846be04f6520bc2e58627daaac1d4591f5dfcb5ea9d8e652a95005b01108b9208deebe9a62a7279c8983ac1f3bbb088e137a818ac6fc5ad0eb804ba261d9b623bb6f5c736edbb0b1407b83130660e7f9a692cb8a825b37b1eb71d47457bc692c65977c99af918840a6027b3089b22e7ee5d8064c7143930ff09a65be7440609bcee347295be71007e2f5e6c51caa7cb365920147dbed360c5b0fce27238ffbf0dc7e5f4a3d31e2857c7c76b18084aa6e4b1885605ceb4b94271fd081c54606877af7abfb24dabac92bb163be410083a0a7e6ad0049a51e0ebdc78c39f9b138cd"]}, 0x100}, 0x1, 0x0, 0x0, 0x4e78d3be87db2de0}, 0x4801) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000005d40)={{0x1, 0x1, 0x18, r0, @in_args={0x1}}, './file0\x00'}) r7 = socket$nl_sock_diag(0x10, 0x3, 0x4) syz_io_uring_setup(0x5d0, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) r10 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) syz_io_uring_submit(r8, r9, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r10}, 0x0) r11 = accept4$llc(r1, &(0x7f0000005d80)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000005dc0)=0x10, 0x81000) r12 = syz_init_net_socket$llc(0x1a, 0x3, 0x0) r13 = syz_io_uring_setup(0x5d0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x3}, &(0x7f0000eec000/0x2000)=nil, &(0x7f0000eec000/0x4000)=nil, &(0x7f0000000000), &(0x7f0000000040)) io_uring_enter(r13, 0x450e, 0x0, 0x0, 0x0, 0x0) r14 = open_tree(r1, &(0x7f0000006180)='./file0\x00', 0x1100) r15 = syz_open_dev$ttys(0xc, 0x2, 0x1) r16 = getegid() sendmmsg$unix(r4, &(0x7f0000006240)=[{{&(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000002c0)=[{&(0x7f0000000080)="a98d76", 0x3}, {&(0x7f00000000c0)="3727ae1eca2d80f455439d35e4424ef5ca71399e2b826535b049da6a8a035883551ec400abe9b8fa4be2670044163f210fcea28bc6c9388a51f5e9d946c59a7ebaa80ff8c660dd210127c9e00537340c7edf6738b427b88e323bb83a3b0b109115", 0x61}, {&(0x7f0000000140)="9856f628da30c9bb45f10fd6960bcee184f1dd8e0fac1b3f30097e608e5e503c84b2d38dcf79cb625b422ffaeb0d5bce52ea77b5f0287dedd4a0e7e7ed2caab2e90c2514f4aaa27fe9056c66f782c1cbc38523ea92911f61f605740e16e2a942be2ce4efe2b471d184595cc65dabe6dcba36b5da3c55cffd55cb07540cca9277453ce5c551a4be7294a402124db85f719196ce290076d62a5d39f9ffc88e9227ddfc8f50215db48934b0e6c5eea50e9d7ce559cdcc6c1ef9abe9718bd16d8e3b01531f211e", 0xc5}, {&(0x7f0000000740)="2fe0590121aaa330e0fb4fd8b77a3aca7eefc25d66a0c4825625731070a49f39def6d6a338da35feb660c385489db14c8d2472ef150df3e1ba3fedb4e802263886de6ce947391ad4210bc5d1d98b70453e59f770be90b160ad0f7438c5c0988d13a5603acabac3e8b91e6165150f20cedd8bcce1296af333d59e5cba48ff1817529214284888fb8df913670c24fb8d9765ae2116e2abe753cd0b6011219eec2e2f1d29030a06bf27a1096a16d26831ee4835dae071cbf7ff621b92", 0xbb}], 0x4, 0x0, 0x0, 0x4000000}}, {{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000800)="234060c0801acf6fd553e50395ee5f461e92df73480e349db69633ab38968f500253b88fc491e4e321ee398aeee3e0511fc1bae44282bca302aa2d8b20a0cd86500ccd73d5e1e37d1b0ec9f6e9ecafb561f31b63b654f365b25640230cf3cee2d3430dd4141a32151212580dcae7f9002b375419c8e6d3968fdc193d614fac1e6420749dfdc36db13b", 0x89}, {&(0x7f00000008c0)="080c39c6bed90610b4408cb55b7e7a073f611c782ae599c62eae9adf52ad231ae3dab28949973f638ddff0250612974ac190a2a85a8d2c8ef6003a542363232987ad4e93e4f03b423ceeb7d2897585b822b18d6b44aa9970be3ddd1d38ae7eb7625a4343da7496398f9eca8c307730c5eecc9a49e9d9d083c9a3be518eb4be7e7a05452d954855546a229ab97442b9dd8557ba23cb427c710467702aa22aa5498de1d84e7de6439a443663693d7eb59636d5c09b88d59cf739117f116f0aff3955b2", 0xc2}], 0x2}}, {{&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001bc0)=[{&(0x7f0000000a40)="4b301d1bda8c7f509eac5608b19e1babde62932e32c8a466c6f9d846b3d98475e584042185e7df7e800068ebaaef8aae7183429306397f9c9194df826dab3d1ac1", 0x41}, {&(0x7f0000000ac0)="8aef0b0aa41ddbe1a703e3739d9ef60a6bcde878d629505cf519d869e90c1c88013e2b7e497901ad58b4715ce7474115911c38c032904c6b63a182709ea9c214cdac33f62b81e54348d3123a7ab9e35f3156caf1c298e949712543fd623bdaab49af6da817fd595a30e1ff70e846931983e1bb10e4a3dd060675933f41fd547950f8b9006896599c886caa882f2c539e10f096a048cc2eaf504c097957e7fd16037624ab9f175e26612ed422b61a76c2c8b6004de8ff585acc9a3c3b5422", 0xbe}, {&(0x7f0000000b80)="e80329cb0721b6050f8f7cd32ba3652a0f2a35e7d1578e9e41ef1dff97f258c017acc555ff83c62a932aa437a06946a3428be129ad8c888c78", 0x39}, {&(0x7f0000000bc0)="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", 0x1000}], 0x4, &(0x7f0000001cc0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r3}}}, @rights={{0x18, 0x1, 0x1, [r0, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r0, r0, r5, 0xffffffffffffffff, r1]}}], 0x78, 0x20000}}, {{&(0x7f0000001d40)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002080)=[{&(0x7f0000001dc0)="8cf2e953e7d958f290a688019b0da2689c01adb758bad62a9bb695419194beb0ae49f2d048fb75bbe5beaa737059aed535211c82f83b9c94cefd1f01eb4a5d423c4c8ca64464f56e8c712be91be71157e526a6268abbd28fdb328722d5dc37be", 0x60}, {&(0x7f0000001e40)="2913e0f78d926cddb9d92f50e45816e8d9ab6fc8ebce27ba4126112fb313a79278669b412ce1a130f815b3ca70a8493ac0d436efbe82a41366ace5a8f9b5f083706c78481085becb2b82e60229e839582022ba09d0d6310993e5e26494188f2ee9c063eafeeae3dc2e4d4e7144d508b7051679cba758e9fbb71aadddcbd49b1ad034560ebfa42dff4825ecd29461d2553d00c4e04d319ddd146f125c432463da43b4bce39ea5708d9f2002e399e30063ce22baf6b8e38c376f0e6b119c9a8ca9378cff591a1e57", 0xc7}, {&(0x7f0000001f40)="17d9bedca543d3af8d8e691a9377dcc1b1e6bae891656154672ea059bb5e2d2e14eaacb4b9b8974813186c5bd76a1792f77b038b03c89a5378c2f81a636a45e9d545af778d522c1bf5bf74363897b4ac672efde2e63deeb06741e77589fd39d8263cc6e2bf6121a8d69450aee44087507356e2b4a01f7c1ed9e1bb59aeebecdc838209dc540efc75b5dd8fc3822e39f870b036a48feaa27269e6a3d0e8039a45e9c1046808fead9ad4e597083ea7acd72aedea59fb5e6d20a2f052cce6e509686c6cb9cf44ddb1a10de8cb18e1ce4ca8b56a07093bba837c3104da5520aa081361803aa8cc65da91e1828c922eadcea4be127fcfb4ba2bcba2", 0xf9}, {&(0x7f0000002040)="9a099b6aa477fd0f8b801141f23a7528741117f9cf888c3220c61f305850a99a290eb4838a", 0x25}], 0x4, &(0x7f00000021c0)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, 0xffffffffffffffff, r0]}}, @rights={{0x24, 0x1, 0x1, [r1, r5, 0xffffffffffffffff, r4, r1]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r4, 0xffffffffffffffff]}}], 0x78, 0x18080}}, {{&(0x7f0000002240)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000003600)=[{&(0x7f00000022c0)="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", 0x1000}, {&(0x7f00000032c0)="105427abd53abe7cda4a760008cfe3d71677b26747b12b2e253afa61a561dfa82be0307e876f9fa2789465d2108b510d4bb4d6bcc66a32e8cf7e1c75ac75aff391a52659f2bb133296c4574c95a6318cd3c139a0ed15f600f4b2c9beb620c4ecfbfe2b4b26589a3376e1513836e125f65e30d6462a9eb572ad34b30023d5d8dbedd5c30b8bcfc061af5de27b71afbe2e8e4a9eef9d17e8c55177a7a17427c4630eeaf3aade3f", 0xa6}, {&(0x7f0000003380)="58b10fe3352e77c186cf75521c02a159d06bb0e936cd749db1b6a80bc0074b90cf26b274776edaf0c83ee2c6bcb9e113c9c8d6eb45e5e1", 0x37}, {&(0x7f00000033c0)="485a31bb7f20ec77540b07845a2ef76105a284e9572c376dc1fbb9f7b58501b884a4d24b41d3256b07cf1a41136ec6875a3dd5ed576e785d83c976fef037166e9ee910cef821a8ab82f1a19a5d97d0153321d9caceb9ffc138f2d007f6d59b8c4aef595d7dd37293afaaa2151caacb07cddca34aac9248784b7ff94ddd3f58897c8c5b4828c407f4b702fe184a3bd891d24183c69cf5bff809cff2e75970bbeaef51858c0311a1a66a1cdb1811f742328b6deb5592a18323f000499bb5d2e5e6223c28780738720ed11f8f1d4fc9d79f6d66000d2f85dedb1b16e30ba9855627ec39", 0xe2}, {&(0x7f00000034c0)="44e87fe6f42345bd636b0fc5c4a9074dc926be3088a92a3619d3020bdd0c1dfad7316859b4d6c16096185a6b326583cbb89844467ff34a9d192eb939eb11c59ebf30c872751459ab71ee533752a0457f29d07f7840b5f8e7232cc985da2ba24fba9b6b6ac527d9514bed506f42", 0x6d}, {&(0x7f0000003540)="8014623e6ff74aa1d49cb67a5d99fbaecc51a14ce607ddd46f3591310e3fc00643a63d960aba4926", 0x28}, {&(0x7f0000003580)="dd089a1f25f70949811a62d16355f2c0d02eb78a6d62be689918e1a7442a6b561942e1253e315a9108952000330e4777b159836d5c822e1753e0cccea9b71e9b2546811eec57f8d0b99631d56e770b85d33833296cb90230c4f1e47b184ef422c6c601338310d61711fd3cda6ad95c9d518aef7718a2f7", 0x77}], 0x7, &(0x7f00000036c0)=ANY=[@ANYBLOB="18000000000700000100000001000000", @ANYRES32, @ANYRES32], 0x18}}, {{&(0x7f0000003700)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000004a00)=[{&(0x7f0000003780)="247c859903094156bfdd36044fd8a57748e9df00de00557e102e380d4795d8477eb866e7ddce019d057cef973fae2ab8ba04936e954b675ecd020039c52a7be8e7c945231b5c60613e9151b95a29831b52aa7d4d30d5a05c", 0x58}, {&(0x7f0000003800)="658ec6a295f05d0018e69e5c2571f2a4b1049a82c5be6516c81616f84a19230c6732cc1f331fe8c29312e96e49f9bc4a8e4e4c115a66ca520962d5a04de7a5069318af187ba99be5a2043d9ac0265674560dec919dbcb1f295ffa0d44be27d019fe1e6b465d3c35f0aa207c8f16ce1de23b3b00102ab5f672b66631cca3486ba6f1ecb0db1", 0x85}, {&(0x7f00000038c0)="c61589c2b43828aec85a730ad9c1ad6865c953345ff3910c8bff09990c29a67365c05f76911fba673347dfc1bae17689cb717555cb11ee0639d9062fbbf98ee4d28dc3e802490a10190a64ea3ed148da15799edee12d7e42ac699ad81d767b65eb98ea2ca8284a41ffdfdb9f11d5dd4f8895d983e8d3305ba8f353249df217759737e419a534e88e16a033e334f744c8ac2f9029f14d85bdc6b1043320a92dfc6ffaf93c606293a4ec1974f892e35987419b0b502344cc3412e32a8bbe24bd3c0eb7ecfa528f8cc930d674872c54f0ca89d3689f6a4433b9cbed179d6bd4137082410b0d0c9ecd2ccb48e01ba9188bf26f5e2d4739fef22ec862d95d7728cb6f49d7330764c2685273bacff4ac62c0372bbf3cabbae2304fd997f0c1948c8710214cae533d09f0fc4dc867d1e45dfdc700defc47435692c4b00bdeb0412cd06d7993fa89f0d781fc793d2837a80aab3673fefafafe6099af75d92abc03ca64b62dd1f46fa822bd141d1c56f5a0610e40799c1db5618f0c9fb0908b34c38d5a775391d72f43c50a34aa8098ca6c86d11754978d6329d46cf6d5ac797b62ed5e2ca67b302d2f6e3c1dfd74dcbcee243c9b92ba6158096363cd6916945ce05b287da29dfb6d8eb595868e3b6646de69a20a6ce458486c7015f157f77809778a5409b0272f8d105de9e4bd656fdc5cd1eadb86983a56262fab355f9768133a92db1f0458cd7740f648817c147334c4417bd5d11e7880ee09c9fb6a22d24a9d4848633c6959fcd21056865cc6298d7d467f1c0fc220fa35ba0a90de347dcca5a8bc086a08a6eeb32434b578610de05ba193fcd3ddb0c5be7691f11b444ada8adfe2724bfdc0ae33260e6109e9e4037db033ca7f800554633a2f481426b6631f47d47301d812afd51bf640e7905146153a1626e8c8e7a34131cb440eb0b054c3fa6aa4a517808fac34e485003996b74caac773a64559115badb1e986984df933698a28337de70a8053a463ac45b5a531bdabb0127c21e341bf103d79e15f0438f6de394150fdfe7c55fe2c928bdaad01bc530138415121da961aaf96c198908589ce5ad580d59bb9bad3974ed390faf793191cba10a9f0bb0d2a5a64a7a03258817d8a8cbe18ca107bd2f9d1deaaff9e8e12d136a408c44105ca22737463946190b6025e1acf2c9802e7d6d9be4f27e5309a2b679850e0eca652fc1752bf84092711dcd307e4148826c804abea38f73d4a170e3288a97b906376e8f9f9aa799005c055162ed4435d53367c117bf89bc01d0ed551fe1f550567e0a74bc5409372e5a78fbae352d77ac22e448137e7585f6f31dea29f127fef46e3595e2bf59a82b061f5459bb5013418c2ce05dd8ded5a42aa03c4513348998df355f3387979338c34fe42eaac64a94cf3babe12accc8a0a0e33d0cfb327d2e94cd4d80b063c9a5fe9f97c686f808f17b31724737e86b4c225611537d8defe1c873caee33070561f10bcbab67e38a65193b996cbed7f9bfa8bea6ee506853b266c2af04ae7218af397c3f9663218212aea8787e351bf654c6b3d9b9971f65c4438466d41d289b9c0509f84341090d63427cf108b8683c584fce2fb4b87d31e522133277d34d63f86ae53778b847b8ce7ead2ae228628bf1022cf17372909fd68e315b08e489d437c2679ddf8ecd37a391d580858a69c3406e17b6c6aa9104d0bb34988cc11723742e17ddc634d45a5fea7ec43432e734bb57ae1764bef183c6461d6f5bb40ac342fb5acdcd701096490cddae5457e8fb349b31dc7298eed967490016a6e6770c7f5afb34a515e605bb66e4d0d6fc253e762d38f3ed67aca2e40003aaf716db2f03eeb59defc415931a38034826489612e01d02338db9abff7b68f0d9bf6cf26757a34cd3b6be383da3952ffb5cbf8e9deddf5d0044a870dae3cd981491f74d74934a741be70342ab030dc861afe3cc91dd2dd0baf2e25cb9e018f8b76b1bedf04430f89a01416974ef04cf311d17dd3655257e5f77f50c58056095e4712b6e8b9751381eae764c20ce43ebcd300b52dcedda88d122dd8d87acd3635aac8dcafc445e3b582517f313716105e33c1c34fbc4e50130585dedea91be7a0e5edbcbf790b0b910f4a8e4d6b72e07252ed5601ca430506aafc2d06714437199f26d9f1745bd96e001a0008b0c4b9123852c7c6dff8d451535cd04ea63e10cd78030945044857182af3d8afe3f00f06173d5fc8f49a42b0ab1245dbe725f8736cfbdebcee6300130ee440430cea714d1f47c3593184ad049cef93b66c260d2b0abc089248c7d7713973ca17246254fef4c8a628996f95bd79974f3247376d8b6a4a6f92e92e8e97c12e66cb1c31bb2656643059d9902e7d6ea79951bdbb1a3d3ef9f307c6fc15504c2a9872ef6add914298d11c3525b3ae1a5cdec006442bacfea5896eed1e7c2dc122beaf0da19c46c0314ba234c128df000a259d83594937dc689703d56ba1c89f89006ac693ee95c36c167bcf9bdb23c838538cb54f8791019a8a9a7ef0bde2fe96cfa8408e9d407146c30ef756d745d9a92a4e14630e41de4ac4fe08c075b0b4a1a2764c4e2b5310a67754fa7e2acd631a0c141344c704c158ea94f8a9471e87ac1baa6cb4ffdeb9ea8a9206a280c73d9cd2d7b79decdcbb86b88a4fe037f856fb50ef6ddb731b9acd0feff51b571648b33ef857249c046f627a976784c974babaf081d6c76ceff0f3ac9e93ba52c7735ced5d82ac3f561c268ba6d40d5d69e9522b748b10bbd00836e2d1e4bbcc1a9ad33747afc9eb27b1b66f1b51dd66711f4e868ef1e2cb45ab3a6fa741cb2a2c5be6ed5db19d2d13f87e1050e6444ac9f317a2748ed04c5b09593bfd552c509948ef4f81c0d0f235a87a54d0f1e21cc60a2cfa6071f40c5b91b6c75877267dcf10d76e497576c348094ef68754da0b5a9758db616524c24203a299814d59d47b3693804b9134ef1041cc66f06006103918f1687887f4b719f21859b4d8fdb0f11bb5b38cefa4cd9f0492dcffeddf1081e23ea5829c70af252e834d978324328b552749f72d7ea9eb1fa31214384d33820a216321e9662bb342cf2b6f31aa347487ff96d8a6ce3bd8eaceb09b0193cd60acb49ffa48f3f95e9edf80bc2a8212f9597c09989a993bc68d11c92a99bb2d058e65ea5ba903c7e0f057df098ae69ae0086e80cec65e6e36901bcc58d6d062ec5ac1b20a8f6cc3847729d8eae014c1b9718d686030a90d8b54fc6002fa6b7d9cc3e0623fec9e6134ce7a978af5a4913723e9ed01a59ca00a011b25b577f4543ef2cf877ceb11bd837954f02b487cb90c64bcf65fbaaf5c9fab9ba56fedee21730437fd46df80cab27c5848358c3c29d8726c7e1dc70f85b8b37cb3d7a495e0af87ea5df31a8ce43fe5c7a0d355c525e92a0c8cbae6aab28e70f3815658f9d4e72cf89d964558d2b99297f80d93631b979c16357766b06bed0c2c63231979c9bc21a2a9028ca5acf4c37560b63d825b0afd7e8b579735cfb5e5566acf9d627a69f5a96c76730eb5d5939d01be46f0d275b9cc5e4280450837436aee478e545b549bf9ef5796324d5e293cb960122897d648481f34b6cec2e0aa02d0acf83d7eab0c9c01f370eb7a16c136cd45bdc6861870fa281108d7c612eb3e95e8685c16b085aa77dee470e24c4470c26780a120af25e02c38191824b5028aa4d76f9346ad230731842f070a65f9e698fb9c3d886a6354b8be17d1b6722cd1283918a90334056dccef12d46b166f7bd52afe2265f087f634d26aded5ee8ddb4ff4ae611fbc42066ef2dfa9edb6300a75cfaf2c740b7aac432fca34691386f8875914a39c3389048ebd6b1dc95d0566e13b21c96ae472d42f99a65a45b1869f744e954e033d49a20028c8475bfe3833edeef3cfeed0903ea099f51cfad479a6b13a0c7972dc971dee47a8abf94a066eda20f1c3c8e25431d19625d10b382cdad8bbf3e088438ae7426827b02d60bf2abffb2f0b37d72815349c8dacb107278a616701ebcc147d5b56d114d0b8b66aca4720cf023c1f1f06783e3d52a6736711c99837e38d7b71d7ebbba5dc9c9cdfdb7585ec304db83b8c67612e3d925e615ae8926719da4b4ac593a45d790684ecc45c1edea9e0261df36e718bb3de6c3295304d1f526057c00e721fe427624f427e069771686e8479396529a13b499851d67962bed19f794278f323af94e7e56cce2e14953d7c0f9f072256cdf0d57ddab93e86d10179f1cfcfc84a258b9a2a782773ca13ba382e4ad65ce7d27ad5cbf1ba8946e7c8b71ac82dd5e5f2c7d68c6b72b4449d27110ff3cc9454f8149806776a91f399ba80e985fe345e3bd2c6cead8d90153d4eeb86c2153eda9ef66513b62afa5c5eaa742c81948ca8aa428145a42849a757d36086e1db9dd6171d07fb215911d6742a57d7180f5d0e718bb0d0af2071dbc1cfb9d6c3900ba18967bc469faf886dc26bdb59543c80d74ca85354952f9fa659ed324b4673d69c7c238cf2c282acc47af55a65d095d253e26eff23ddf5fcb1ee40028637ec478b3809dd65d9e756762bb816918baabd9531aba1427fe9d115a0463b02cdfb370af5650714b7950847bd9971817d6cf6342b380745f8afe33da836f200e804a23228fb792706c81b212b33777b34b9c83b90c03106d5668939725bd431c70c5c9f1a5cdb5d85f3cbc8e73a5a9a13828aff71c1719e6c58a5b2bd039ff2beb497dab981844c6e21db2664418c3428c33e0622f9f49d46a418ed2b4c7a046b212e81c4a517fbeb56625521c9b0f8a4cf23468210670e69fb7a03993d0dac09eaa583df7cc3ddab88dc64bb4a1343bd06f93252b7c87c715eaab778fa43046e89d90d83feaf7adff796a1912602b0a69c45eb6c35d9f6bc0aa27bc7b7147a6c49d30fa589e16634a68e34947cbb735d22a8ec68d5a6bc404e6d42a67870511df30cebd2c40a029d677c382f7b9286c860a09484fbeaf3d813b3e6f19ebf8f75ecde82e809a53ada29fc038f098eb20f5a2386598b4abca60d608d8a9ab8f0b49ae36977d95882dc4ec9470a12d516aaba2f0c340242472cb40761056449faa136d857f0473f4b57aade76b436f56ec186ffbd6653acfc74e1ebeee19c6fd60a85aa1081f7c4e657d0eaffb6e2664332400721499b32836ea09aff7d32d8a3c438241b5a1a16de78fbef13bd1a2692ab3d49e155a54a716a3c9d19b3a7d0d559fce19728b7ca7fa66bba0861ed27c498fb318450054354a3289eee75f2ade38c44725c087430fb4fcee016a61e8e2d89c957449a565a9187a6824f034d537f0468c43254241b456cc8bc2fad82d1c58d9dcb59942518a0323d0ed52661c6d8f99efc1cb810eead7584d72ddc4b049024473fc1f1e72d822fd7daeb43918fc69e56e65c9037f024a4fc848b45a02b439b722f1415181cd76cad64698d4615a212e1c524713c16f9dc34fbc5fa77e5c666986b038ff88d37fb3be787ada637dd7263b827b9e07bb2c5900217225818a48fd2c13bd1b3fd994de1095d5b8a142d4f8fe0227d24f8b7773968823ad8cdec254f3895ddccb983371eaead175d0ce54743180262d9f2b8924562025b40dbf998970303901d551023bf59e654dbf292e6c67df62967012faa057ec0b725ea51b2af8af46d6f829af6c9d17a53b3cb97182f4d37c15e340519630a3e9917901186fd9b16e91ca18da3177f352af086404e67ab4e5743a0f797c9de9ffc28126d743f8968529106aab718009fe5f0c670d9f857e54ad34d6129bd0b6e68fe04ec", 0x1000}, {&(0x7f00000048c0)="4e3136f43073113f2a04b5f14937a85e02d9201bb93fe9e693e51fccdd02b27649205c30ee0d8f1bed63b9075ab3451a530d35326760f83e77903b58463896ea12b204", 0x43}, {&(0x7f0000004940)="251d8db1da49cc3e723c38152935d9e81628146f30a1bfe87e9b1524bf6c246c7e9b6ee683d26f23fea629dd1c18102e159462e30dcccd6b46017e550ed6679a7e34449fca16e57e43a885fb5503ade10ebf0fc9bb1e25d3ede7c6925beb70cf4505fbf390c8af8ad6cae50f844efa95e6dd8f947a4676d56110a3dd0bcf9e41b77dbee569edea0d6895c4ceb39b48f85d1fe02251b51f3c80ebfb549b98432036b75392a90c9eb1e79b92dc838d5679982fa7bd731d4f3a313df13ba564d407", 0xc0}], 0x5, &(0x7f0000004a80)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r2, r3}}}], 0x20, 0x4000010}}, {{0x0, 0x0, &(0x7f0000005d00)=[{&(0x7f0000004ac0)="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", 0x1000}, {&(0x7f0000005ac0)="6290dbef3274635196df22ed011bb726c8e01652ca714d4e0fe449443780b9bd13c8bcaa034d592f33f101272d139e5bed16adf3c734c93af8dbacc25b8dd9474d9b7ab5097ae57c2fcc111cf11330deeb256c679c430ef7026b90c51f08aa93016e6d670eadfcb66219b2239e", 0x6d}, {&(0x7f0000005b40)="cf071325254dbf8b6944def28ebd3b3bd4d53cb7e216c3bec676ecad384526533bb92c0018c7c01ef1ad0b5a74642938115664d1ca9dc36e6190282e16e1e9ad0df3e79c32d1a545669ac25db3e69463a4645570d129d1783547bfc490b64538e673d5ca7cd3f9effecd194b34b105bb9b237020ad7f9b8d03caf5cc157f5992b138a22ca248fa1b7f6f21697fe81c729422119ff174870c1f3deaa33d49eee8686b498dc5c935505e82ae2e2b7c5712fdbb6213728171ae3f777ad21fde528d853ff81dc48b59350268b9605aa190d39f384c275cd197fef351209162d0b40388ed51d3e41165e7ad6d0f5913027d465dd33c008d5879149d", 0xf9}, {&(0x7f0000005c40)="b3ad966826313532f70dbb82ac4dc10814aa73aee3e0cfe4d22652dbf9819673263b6ce6250a62c3ea5fdb1d725946dc896185a1066ba0f4a73766493581aa22f73b612d27162a765b3a61bb5354288b16e94fc45e8b083be04c15309e3137adfb6510d57cd3280676ed66b763d6a62b5ba68f41a875d624f861504ff2ef47bfb1b6af62fbaf723ec153cb34b6760e0edff073f30fadafb8", 0x98}], 0x4, &(0x7f0000005e00)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r6, r7]}}, @rights={{0x20, 0x1, 0x1, [r10, r4, r11, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [r12, r5, r13]}}], 0x70, 0x800}}, {{&(0x7f0000005e80)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f0000006140)=[{&(0x7f0000005f00)="fe49376e99e927228ee3716bb6e7d6852892657ceba09300aefdb0a4a9c27cf8ddeb6471af8598561c12fabc335ba2bb97414829f3e1ba43f3061e123f094b4d5ebb74434f38f91b0a72b2fd78f5a018c37ca62179e2434ab63cfda087bd3cfabe7885e93e1788bea227a3024e76708bb447c78479370953b72189f77dc897a2766f993a7cf4704ce8f504ec3b6290099231", 0x92}, {&(0x7f0000005fc0)="aa6f0b8e36c4df9d4b7e5fae905e2c5c3697214556053206fa5d88517a8b855af22482d996d9fea0d4f7d9c9ac24c45c36c9b62d4a728c0ce7dcf8f0eed393bda8d8ccc41846039cf675c852298d3ca958ad61bf808b5b83b7dd15d56dfd", 0x5e}, {&(0x7f0000006040)="8474539a6f4a9fd3b981e6e108c5d1d239c805d4d5793ac385e4fc6a0903a4839c32f924f5ad834eb44fd5e0845745b833f7bf44ffae1953735df4fdcb4bc56f7177289b9690c519a5b0d5b11fd6e2a7880511dff4e73c91400c9785fe6eda850bd1dda8e30f9c3cebdc169c89a354bed18dca42b36d2f7ceb820e95977b8f0d3352c8803b8f2ad3037a0ae7d90b213a41179073af5da56b6fc9a325081f092ed26a06c3c46f540612951f5fbd6522db0ab5dc23377be9ec8186bf83424d2cd377803819ed1b7931a266f3b0f67a6b60692139", 0xd3}], 0x3, &(0x7f00000061c0)=[@rights={{0x34, 0x1, 0x1, [r4, r1, r0, r5, r14, r5, 0xffffffffffffffff, r0, r15]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r2, r16}}}], 0x58, 0x8800}}], 0x8, 0x800) 07:51:50 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:50 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000500)={0x428, r1, 0x4, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_NODE={0x258, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0xc0, 0x3, "57aeba3570b275b32142c3a4e66486d1c041b0a27645c27da7dda6e47a901191572d66b29fe3b67e745d70bf0483141fb217c1a1f16006b0c2fd237036165ed82467f16350245996b1f0be5566c5e0d6e480b4d42230e34cf16deaeea7f631b387edfc7f9ef1a26eff69f6aaf41703a5e0b1580b7b945fed5c3518f2ff2a771d19981eb845cc4497e8dcf4c9865deebbd0632eec13e8bb8dbf1abdd8061fe1551fa95fd2981cf435a1bea9fc97e8abc298f4f3d25e2c76de7dc48a29"}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x20}, @TIPC_NLA_NODE_ID={0x57, 0x3, "0288907c644cda2af37475e08f141295c280a7fc5053848544dd64d42685c1c75d794fd135729c69d4f518f3ef04a547f23b24a9f6d596c0fc8e98075a9ae36b460f9664c73f88c656aaf38c4395f2214952d4"}, @TIPC_NLA_NODE_ID={0xb0, 0x3, "a4182c836aa1153980a3a7b1b6ebcbd57aee6b5a9894eca9f0059bde35590fcec5d886e9dcea3fea67b9c5cbd45e6cceb08e7ad05e595a44940fb2ed4c7a052653efcaeee9ac18702fbb2d52a52e36c611d7c81adfd12e40b31a8a085546827a0a11050b9b6433f34ffd6483f68e50ed59a49e7c40a2e5b18478c14be0292906a9abde0421b5cc2dc1b6e17e0b8aa89c3b5746e44815ca897476338c67c62f85ebca2b6b1540fdc309f4ce2a"}, @TIPC_NLA_NODE_ID={0x4f, 0x3, "b4230ad184873d7212a28b8eefacb92dbbc8eee16ef133a4e75320481dde4786fd8975995bbed03c6340b18b11adbcb3987d6aeb03769eb0ed1769ddddc124f2e86c1cd75356129e311f1a"}, @TIPC_NLA_NODE_ID={0x2d, 0x3, "aaf21be2883a0ca2d58c4fa228afeef5093b2bde792e9f79ba773722123b9faf5d345b5224cfd8459a"}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0xc8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x3c, 0x4, {'gcm(aes)\x00', 0x14, "4363afbd940340bfca65cff39deff04be8d096a7"}}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ID={0x81, 0x3, "8f4c268b9fd5b254d2cda1caf738e280bbd3032f0c9a4a522721cc7559de7546f0568e3a9508ab915a5c42ffb54b5aeaf59c4bee105dc25f743ece7b8b29993ea957b0daf309e18d1957e4e47242c3e5d92761840840273a270e6649a537ffc287349118d358e276f94276d177a1d86846ecd585c6e88dd389c391b2f2"}]}, @TIPC_NLA_MEDIA={0xa8, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}]}, @TIPC_NLA_SOCK={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x35}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xbb4}]}, @TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}]}, @TIPC_NLA_NET={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1ff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xffff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x401}]}]}, 0x428}, 0x1, 0x0, 0x0, 0xc050}, 0x20004851) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x54}}, 0x0) 07:51:50 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x5865, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) [ 2187.917299][T30838] device macvlan0 entered promiscuous mode [ 2187.931551][T30838] device macvlan0 left promiscuous mode 07:51:50 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000006c33000000000000", 0x32) 07:51:50 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a000000000000050000000000000095bc030000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:50 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000507000000000000000021000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:50 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="394a0f7c390cb429aba027ac14d54d6300000064232f6b7eb23f4fce334c9042b6d27fa16b115dceb4a0aaae6a06ec66f193bc712b38c48008ab7018efe0d161720c98fa1d03782adfee5ef046c63c7492a5d996fca4121f433753854208cb684d539d552d4cf711dd2f871be05dd0f2afd2f70dd2d9e27f5e34a88cd5af7d0e9bf75551d3e78d661cd0e4b69850ae0bb172e7d45192f0ff539af8ec51460983a165b7b55662a7fa3f6f313eaa3760aa2c505396bb59a055ee885973ba3d769377a387b966a8d5f88fe61a6ffb974de7500a9bd1735d802bf29f532575e583af79ad4c3dfb5c5c0033d961b0b71c992a9154d0a85dbf6b2e0bd133ad3ea512ca4cb2", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:50 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000040)={&(0x7f0000000500)={{0x14}, [@NFT_MSG_NEWTABLE={0x78, 0x0, 0xa, 0x401, 0x0, 0x0, {0x5}, [@NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x1}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x9}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x430, 0x9, 0xa, 0x101, 0x0, 0x0, {0x1, 0x0, 0x5}, [@NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0x80000000}, @NFTA_SET_EXPR={0x3c, 0x11, 0x0, 0x1, @numgen={{0xb}, @val={0x2c, 0x2, 0x0, 0x1, [@NFTA_NG_DREG={0x8, 0x1, 0x1, 0x0, 0x14}, @NFTA_NG_OFFSET={0x8, 0x4, 0x1, 0x0, 0x6}, @NFTA_NG_DREG={0x8, 0x1, 0x1, 0x0, 0xf}, @NFTA_NG_MODULUS={0x8, 0x2, 0x1, 0x0, 0x6}, @NFTA_NG_OFFSET={0x8, 0x4, 0x1, 0x0, 0x90}]}}}, @NFTA_SET_DESC={0x120, 0x9, 0x0, 0x1, [@NFTA_SET_DESC_CONCAT={0xd8, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x800}]}, {0x14, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xc0}]}, {0x1c, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x10000}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x3ff}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x80}]}, {0x24, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x6}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x9}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x1a}]}, {0x14, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x1}]}, {0x1c, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x80}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x80000001}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x9}]}, {0x3c, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x4}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x3ff}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xffffff80}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x9}]}]}, @NFTA_SET_DESC_CONCAT={0x34, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x37}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x401}]}, {0x1c, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x8001}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x4}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7}]}]}, @NFTA_SET_DESC_CONCAT={0x10, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x8}]}]}]}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0x84}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x37}, @NFTA_SET_OBJ_TYPE={0x8, 0xf, 0x1, 0x0, 0x3}, @NFTA_SET_ID={0x8}, @NFTA_SET_DESC={0x290, 0x9, 0x0, 0x1, [@NFTA_SET_DESC_CONCAT={0x174, 0x2, 0x0, 0x1, [{0x44, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xd8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x20}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x6}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xfff}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xfffffff7}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x3}]}, {0x1c, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x4}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x5}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x6}]}, {0x44, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xf530}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x9}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x6}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xd6}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x4cc8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x1c4a}]}, {0x14, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7}]}, {0x14, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xaa0b}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7}]}, {0x44, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x101}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x4}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x9}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x4b0a4673}]}, {0x1c, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7f}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xfff}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7}]}, {0x44, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x200}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7f}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xffff05c7}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x9}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x5}]}]}, @NFTA_SET_DESC_CONCAT={0x80, 0x2, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x1ff}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xa9d}]}, {0x14, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x9}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x34}]}, {0x44, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xffffff81}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7f}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xee6}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x91}]}]}, @NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0x20}, @NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0xfffffffd}, @NFTA_SET_DESC_CONCAT={0x50, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8}]}, {0x34, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x6}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xfffffffa}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7ff}]}, {0xc, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x4}]}]}, @NFTA_SET_DESC_CONCAT={0x38, 0x2, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x9}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x80000001}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x10001}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x80000000}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x9}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x5}]}]}]}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}]}, @NFT_MSG_NEWFLOWTABLE={0x43c, 0x16, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0xa}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x1f8, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0xb8, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv0\x00'}, {0x14, 0x1, 'syzkaller1\x00'}, {0x14, 0x1, 'geneve0\x00'}, {0x14, 0x1, 'gretap0\x00'}, {0x14, 0x1, 'dummy0\x00'}, {0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'veth0_to_hsr\x00'}, {0x14, 0x1, 'veth0_vlan\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0x90, 0x3, 0x0, 0x1, [{0x14, 0x1, 'team0\x00'}, {0x14, 0x1, 'wlan0\x00'}, {0x14, 0x1, 'veth1_vlan\x00'}, {0x14, 0x1, 'bond_slave_1\x00'}, {0x14, 0x1, 'veth1_to_bridge\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'veth0_to_batadv\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'ip_vti0\x00'}, {0x14, 0x1, 'ipvlan0\x00'}, {0x14, 0x1, 'team_slave_1\x00'}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x80}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x54, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond_slave_1\x00'}, {0x14, 0x1, 'ipvlan0\x00'}, {0x14, 0x1, 'batadv_slave_0\x00'}, {0x14, 0x1, 'ip_vti0\x00'}]}]}, @NFTA_FLOWTABLE_HOOK={0x204, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x54, 0x3, 0x0, 0x1, [{0x14, 0x1, 'wg1\x00'}, {0x14, 0x1, 'team_slave_0\x00'}, {0x14, 0x1, 'veth1_to_hsr\x00'}, {0x14, 0x1, 'lo\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x7c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'tunl0\x00'}, {0x14, 0x1, 'syzkaller0\x00'}, {0x14, 0x1, 'ip6tnl0\x00'}, {0x14, 0x1, 'veth1_to_team\x00'}, {0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'vlan1\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0xa4, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}, {0x14, 0x1, 'veth1_to_team\x00'}, {0x14, 0x1, 'sit0\x00'}, {0x14, 0x1, 'veth0_macvtap\x00'}, {0x14, 0x1, 'wlan1\x00'}, {0x14, 0x1, 'syzkaller0\x00'}, {0x14, 0x1, 'syzkaller0\x00'}, {0x14, 0x1, 'macvlan1\x00'}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x7f}, @NFTA_FLOWTABLE_HOOK_DEVS={0x7c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'rose0\x00'}, {0x14, 0x1, 'bond0\x00'}, {0x14, 0x1, 'veth0_virt_wifi\x00'}, {0x14, 0x1, 'veth0\x00'}, {0x14, 0x1, 'wg1\x00'}, {0x14, 0x1, 'macvlan1\x00'}]}]}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x5}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x6c, 0x16, 0xa, 0x301, 0x0, 0x0, {0x0, 0x0, 0x3}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x3c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x45b}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'ip_vti0\x00'}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x5}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}]}, @NFTA_FLOWTABLE_HOOK={0xc, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}], {0x14}}, 0x978}, 0x1, 0x0, 0x0, 0x24000015}, 0x4004014) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x2, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x54}}, 0x0) 07:51:50 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000008847000000000000", 0x32) 07:51:50 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x6000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:50 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009500050000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:50 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) [ 2188.158417][T30969] device macvlan0 entered promiscuous mode [ 2188.166497][T30969] device macvlan0 left promiscuous mode 07:51:50 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000008848000000000000", 0x32) 07:51:50 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009500060000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:50 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000507000000000000000025000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:50 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x2, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x54}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000001900)={0x1c04, 0x7, 0xa, 0x401, 0x0, 0x0, {0x7, 0x0, 0xa}, [@NFTA_RULE_HANDLE={0xc, 0x3, 0x1, 0x0, 0x1}, @NFTA_RULE_POSITION_ID={0x8}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_RULE_EXPRESSIONS={0x1b60, 0x4, 0x0, 0x1, [{0xdc, 0x1, 0x0, 0x1, [@queue={{0xa}, @void}, @byteorder={{0xe}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_BYTEORDER_SREG={0x8, 0x1, 0x1, 0x0, 0xd}, @NFTA_BYTEORDER_OP={0x8, 0x3, 0x1, 0x0, 0x1}]}}, @hash={{0x9}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_HASH_TYPE={0x8}, @NFTA_HASH_LEN={0x8, 0x3, 0x1, 0x0, 0x87}, @NFTA_HASH_TYPE={0x8}]}}, @bitwise={{0xc}, @void}, @payload={{0xc}, @void}, @objref={{0xb}, @val={0x5c, 0x2, 0x0, 0x1, [@NFTA_OBJREF_SET_SREG={0x8, 0x3, 0x1, 0x0, 0xa}, @NFTA_OBJREF_IMM_TYPE={0x8, 0x1, 0x1, 0x0, 0x4}, @NFTA_OBJREF_SET_NAME={0x9, 0x4, 'syz0\x00'}, @NFTA_OBJREF_SET_NAME={0x9, 0x4, 'syz0\x00'}, @NFTA_OBJREF_SET_SREG={0x8, 0x3, 0x1, 0x0, 0x5aa6224b1f8b5168}, @NFTA_OBJREF_SET_ID={0x8, 0x5, 0x1, 0x0, 0x1}, @NFTA_OBJREF_SET_ID={0x8}, @NFTA_OBJREF_SET_NAME={0x9, 0x4, 'syz1\x00'}, @NFTA_OBJREF_IMM_NAME={0x9, 0x2, 'syz2\x00'}]}}]}, {0x54, 0x1, 0x0, 0x1, [@exthdr={{0xb}, @void}, @dup={{0x8}, @void}, @fwd={{0x8}, @val={0x34, 0x2, 0x0, 0x1, [@NFTA_FWD_SREG_ADDR={0x8, 0x2, 0x1, 0x0, 0x13}, @NFTA_FWD_NFPROTO={0x8, 0x3, 0x1, 0x0, 0xa}, @NFTA_FWD_NFPROTO={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_FWD_SREG_DEV={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_FWD_NFPROTO={0x8, 0x3, 0x1, 0x0, 0xa}, @NFTA_FWD_SREG_ADDR={0x8, 0x2, 0x1, 0x0, 0x17}]}}]}, {0x438, 0x1, 0x0, 0x1, [@cmp={{0x8}, @val={0x384, 0x2, 0x0, 0x1, [@NFTA_CMP_DATA={0x1e4, 0x3, 0x0, 0x1, [@NFTA_DATA_VALUE={0x66, 0x1, "f629a617151e53f6744761cfb39960dd11ac9ff5c49bd56abd81a36e3e838a952de57dabede6cc1d36382eac06afcf7cecbfeb2cbd4881f91dd821a5bf397830c3afeeff615cf87a77736930334ca8fa4bf18617221dfd0648ce6f3c32972f98fc27"}, @NFTA_DATA_VERDICT={0x3c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}, @NFTA_DATA_VALUE={0xe1, 0x1, "e2829cad11a8bdbcb8f018596431c4e15884996c74f52e02a025622cdea44a0848a5e2f5290bcb038f5f3e45e24cae20258d51df9f492be3d05e40aba559ad2b9c575d8dc3adf7dcf8b3c16da42dfd4c213af13156dc2621821b104f69d0864784c2b4989dba36e6cfbde71fefa5af9b6bd103d4f7f541c712546e1449d17e7aa20f5d9a5e24629c166fbc15bcecb7f522ffb0a0f866bd50e491d3c1793e98e151a5d58b6d9636870bddd091b1836e03aedcfc4b52bcf3ddb57cd6e73e0cc59dcae753db45ad8b59229a2630fc659ec418013a821e73cff8bde70835db"}, @NFTA_DATA_VERDICT={0x4c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}]}, @NFTA_CMP_DATA={0xfc, 0x3, 0x0, 0x1, [@NFTA_DATA_VALUE={0xc5, 0x1, "4e7439b1be6bd4c6f3fd945cf213d57276c45cf7fef4ae89e4ec8d6f6a23cbaf7d010003feec8e8e2d5e874359b7a33a683ace67e529bf9daf8f72b9afe170730b46323672f06106d7e6deca51994c5dd12465bd2ebe3ed5b0b0a95c5394a1913d7e9332c767272edb2ed851449bdfe763fad1f488080fa08e186af35c215e5a990bcc65cf8ae1868a00e73f3ff616e33efadbafbca7de68806156e8169f7b482340c6bb589b832201d37092b38ca777165ae894dd0189389f52105ce91bc9ddac"}, @NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}]}, @NFTA_CMP_DATA={0x98, 0x3, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x4}, @NFTA_DATA_VALUE={0x63, 0x1, "759690fa292ed6c7f475ef861f9c10dbbeaa71168a002eea0dfba814e329892176fc86263274cb53517d458d6e6ecf46998c649f82db082bdc9c69445a92ad95c683b776b8c20b413a5ca01a776c99618b64aa63fb5348e59f435bd4f85339"}, @NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}]}, @NFTA_CMP_SREG={0x8, 0x1, 0x1, 0x0, 0x14}]}}, @limit={{0xa}, @val={0x58, 0x2, 0x0, 0x1, [@NFTA_LIMIT_BURST={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_LIMIT_BURST={0x8, 0x3, 0x1, 0x0, 0x6}, @NFTA_LIMIT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFTA_LIMIT_RATE={0xc, 0x1, 0x1, 0x0, 0x8}, @NFTA_LIMIT_TYPE={0x8, 0x4, 0x1, 0x0, 0x1}, @NFTA_LIMIT_RATE={0xc, 0x1, 0x1, 0x0, 0x9}, @NFTA_LIMIT_TYPE={0x8}, @NFTA_LIMIT_FLAGS={0x8}, @NFTA_LIMIT_RATE={0xc, 0x1, 0x1, 0x0, 0x6}]}}, @synproxy={{0xd}, @void}, @limit={{0xa}, @void}, @cmp={{0x8}, @void}, @xfrm={{0x9}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_XFRM_KEY={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_XFRM_SPNUM={0x8, 0x4, 0x1, 0x0, 0x2}]}}]}, {0x354, 0x1, 0x0, 0x1, [@rt={{0x7}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_RT_KEY={0x8, 0x2, 0x1, 0x0, 0x3}, @NFTA_RT_DREG={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_RT_DREG={0x8, 0x1, 0x1, 0x0, 0x17}]}}, @dup_ipv6={{0x8}, @void}, @ct={{0x7}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0x17}, @NFTA_CT_SREG={0x8, 0x4, 0x1, 0x0, 0x16}, @NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0x12}]}}, @numgen={{0xb}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_NG_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_NG_OFFSET={0x8, 0x4, 0x1, 0x0, 0x837b225f}, @NFTA_NG_OFFSET={0x8}, @NFTA_NG_OFFSET={0x8, 0x4, 0x1, 0x0, 0x7f}]}}, @tunnel={{0xb}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_TUNNEL_KEY={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_TUNNEL_KEY={0x8}, @NFTA_TUNNEL_DREG={0x8, 0x2, 0x1, 0x0, 0xf49aee8a9800a42f}, @NFTA_TUNNEL_DREG={0x8, 0x2, 0x1, 0x0, 0xf}]}}, @limit={{0xa}, @void}, @match={{0xa}, @val={0x1d0, 0x2, 0x0, 0x1, [@NFTA_MATCH_REV={0x8, 0x2, 0x1, 0x0, 0xe3}, @NFTA_MATCH_INFO={0xd2, 0x3, "318de549f83fdfe3f0cb59cca8a24085cc09622bffc7590a6270b7b8b704c27dce203b1420c6789edc5898de54fa3d5bcac6640ef2bab8de2f3cbc39def1bd6bbdbc51a537f10b145c5ea86c133a641a05da93116093aeb739c5587560f5e9bf2d320cb541fe59c799b28f21a19664d516b077c63fc02960693bf2f5074732decf1b01c6595540f21fa2b6b046b2324c92953618e5d57d29b514c98532349c871699a6effc6699aa7e019710bbec2ce88cb3ab7e4568f7b0e6961130cd06e28e449ce545ae94a5d88ac3b46d1c70"}, @NFTA_MATCH_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_MATCH_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_MATCH_INFO={0x8a, 0x3, "ba07bbb7fdd3be9380dde814acdcc57b7abac07d10bc078eae741684ae325e382da7ed67b5069ff09ec92ff5511e4eef6a5f832b7ac661cb5fc6808e77627e36cdcbbac94eab7714632631d91a8efb51222052a084b149051c674af968a01aef06ec62fb5409d5649c3e109d45e84ea5b744d76638bc7091ee0bd121e49abd050f9c5c0d4786"}, @NFTA_MATCH_INFO={0x4b, 0x3, "4f75cffc65dbdc86ac04dcb66dafd8d838648078593da14ede3c949eae9ee6fa21ec5d349cc7937a54bf14c43577e90bb1528a3040e1f2a0e12f21ececeaaf306e97dc726e1eb3"}]}}, @cmp={{0x8}, @void}, @flow_offload={{0x11}, @val={0x7c, 0x2, 0x0, 0x1, [@NFTA_FLOW_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOW_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOW_TABLE_NAME={0x9, 0x1, 'syz2\x00'}, @NFTA_FLOW_TABLE_NAME={0x9, 0x1, 'syz2\x00'}, @NFTA_FLOW_TABLE_NAME={0x9, 0x1, 'syz2\x00'}, @NFTA_FLOW_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOW_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOW_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOW_TABLE_NAME={0x9, 0x1, 'syz2\x00'}, @NFTA_FLOW_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}}, @redir={{0xa}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_REDIR_FLAGS={0x8, 0x3, 0x1, 0x0, 0x24}, @NFTA_REDIR_REG_PROTO_MIN={0x8, 0x1, 0x1, 0x0, 0x11}]}}]}, {0x1148, 0x1, 0x0, 0x1, [@target={{0xb}, @val={0x1138, 0x2, 0x0, 0x1, [@NFTA_TARGET_INFO={0xd7, 0x3, "ec4a00873e415956b00500f95f38ac2fe5fa004426a4bb77f578f9cac06d1b6c623fd94384ac71dd8a3193dab717db6dddc5a5b680329c8dcfa6179f605d47d87ac42420890f71c85bd4a0906ca648850c4c12f29e1ca1effc4c25a3b90f058d2cd276bf4a3ebe4b9409961ac4da6bd7c5ebde581af1ee6dcb6b60d47122dee4fc46166d900bd4f2533390e75ab2445f1025575609a47bd4f5898b3325db94876d5b34f08422a588a4640a8299a42d9ee41a4275024061dac50d7354ab08f1a0866bf3a6ac17d3972e447931ac69505127393c"}, @NFTA_TARGET_REV={0x8, 0x2, 0x1, 0x0, 0x8}, @NFTA_TARGET_INFO={0x15, 0x3, "8b47462573e390b23ffe59a6ea960ddf01"}, @NFTA_TARGET_INFO={0x12, 0x3, "0b76bfb09e7ce03d6b78feed9829"}, @NFTA_TARGET_NAME={0x7, 0x1, '/@\x00'}, @NFTA_TARGET_REV={0x8, 0x2, 0x1, 0x0, 0x8000}, @NFTA_TARGET_REV={0x8, 0x2, 0x1, 0x0, 0x5}, @NFTA_TARGET_NAME={0xc, 0x1, 'payload\x00'}, @NFTA_TARGET_INFO={0x1004, 0x3, "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"}]}}]}, {0x120, 0x1, 0x0, 0x1, [@exthdr={{0xb}, @void}, @exthdr={{0xb}, @val={0x34, 0x2, 0x0, 0x1, [@NFTA_EXTHDR_OFFSET={0x8, 0x3, 0x1, 0x0, 0x3c}, @NFTA_EXTHDR_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFTA_EXTHDR_OFFSET={0x8, 0x3, 0x1, 0x0, 0x85}, @NFTA_EXTHDR_TYPE={0x5, 0x2, 0x7}, @NFTA_EXTHDR_TYPE={0x5, 0x2, 0x83}, @NFTA_EXTHDR_DREG={0x8, 0x1, 0x1, 0x0, 0x10}]}}, @osf={{0x8}, @void}, @meta={{0x9}, @val={0x2c, 0x2, 0x0, 0x1, [@NFTA_META_KEY={0x8, 0x2, 0x1, 0x0, 0x19}, @NFTA_META_SREG={0x8, 0x3, 0x1, 0x0, 0x9}, @NFTA_META_KEY={0x8, 0x2, 0x1, 0x0, 0xc}, @NFTA_META_KEY={0x8, 0x2, 0x1, 0x0, 0xf}, @NFTA_META_DREG={0x8, 0x1, 0x1, 0x0, 0x13}]}}, @synproxy={{0xd}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_SYNPROXY_FLAGS={0x8}, @NFTA_SYNPROXY_MSS={0x6, 0x1, 0x1, 0x0, 0x1}]}}, @tunnel={{0xb}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_TUNNEL_DREG={0x8, 0x2, 0x1, 0x0, 0xe}, @NFTA_TUNNEL_MODE={0x8, 0x3, 0x1, 0x0, 0x2737fdc0201570f8}, @NFTA_TUNNEL_DREG={0x8}]}}, @nat={{0x8}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_NAT_REG_ADDR_MIN={0x8, 0x3, 0x1, 0x0, 0x3}, @NFTA_NAT_REG_ADDR_MIN={0x8, 0x3, 0x1, 0x0, 0xe}, @NFTA_NAT_FLAGS={0x8, 0x7, 0x1, 0x0, 0xe}, @NFTA_NAT_REG_PROTO_MAX={0x8, 0x6, 0x1, 0x0, 0x16}]}}, @tproxy={{0xb}, @void}, @exthdr={{0xb}, @void}]}, {0x38, 0x1, 0x0, 0x1, [@dup_ipv4={{0x8}, @val={0x2c, 0x2, 0x0, 0x1, [@NFTA_DUP_SREG_ADDR={0x8, 0x1, 0x1, 0x0, 0x15}, @NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0x12}, @NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0x15}, @NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0xe}]}}]}]}, @NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x3}, @NFTA_RULE_USERDATA={0x4b, 0x7, 0x1, 0x0, "ab7a401700aceda1c2bd1ca0df6e08d13564ba6d785697dc8dbc3fcf11711237152ceb337896129271c8cdc263b9b6aced98fbbd263b4e09546ec5edb88d2beef5c4b6da6aab6d"}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0x1c04}, 0x1, 0x0, 0x0, 0x840}, 0x4000000) open(&(0x7f00000002c0)='./file0\x00', 0x90041, 0x4) sendmsg$NFT_BATCH(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_DELTABLE={0x1c, 0x2, 0xa, 0x801, 0x0, 0x0, {0x1, 0x0, 0x9}, [@NFTA_TABLE_FLAGS={0x8}]}], {0x14}}, 0x44}, 0x1, 0x0, 0x0, 0x40010}, 0x200008d4) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='maps\x00') sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x14, 0x4, 0x1, 0x301, 0x0, 0x0, {0x4249ac18f6dcee33, 0x0, 0x2}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20004040}, 0x8855) lseek(r2, 0x200, 0x0) read$char_usb(r2, &(0x7f0000000200)=""/106, 0x6a) sendmsg$NFT_BATCH(r2, &(0x7f0000000540)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000500)={&(0x7f0000000340)={{0x14}, [@NFT_MSG_NEWRULE={0x40, 0x6, 0xa, 0x5, 0x0, 0x0, {0x3ca04f67414e582a, 0x0, 0x4}, [@NFTA_RULE_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_RULE_COMPAT={0xc, 0x5, 0x0, 0x1, [@NFTA_RULE_COMPAT_PROTO_BRIDGE={0x8, 0x1, 0x1, 0x0, 0xd}]}, @NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x2}]}, @NFT_MSG_DELSET={0x38, 0xb, 0xa, 0x3, 0x0, 0x0, {0x3, 0x0, 0x5}, [@NFTA_SET_TIMEOUT={0xc, 0xb, 0x1, 0x0, 0x9}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x2c, 0x18, 0xa, 0x5, 0x0, 0x0, {0x2, 0x0, 0x2}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x4}]}, @NFT_MSG_NEWTABLE={0x74, 0x0, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x140}}, 0x1) 07:51:50 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x6558, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:50 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:50 executing program 5: r0 = syz_io_uring_setup(0x5d0, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x40000, 0x0) io_uring_enter(r2, 0x76e7, 0xaa7f, 0x3, &(0x7f0000000100), 0x8) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r4 = syz_io_uring_setup(0x6f55, &(0x7f0000000240)={0x0, 0xdc5, 0x8, 0x3, 0x89}, &(0x7f0000ee7000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000140), &(0x7f00000001c0)=0x0) syz_io_uring_submit(r1, r5, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r3}, 0x1) ioctl$BTRFS_IOC_DEFRAG_RANGE(r0, 0x40309410, &(0x7f0000000080)={0x1a, 0x9, 0x3, 0xfff, 0x0, [0x92, 0x6, 0x1, 0x1f]}) syz_io_uring_setup(0x614e, &(0x7f00000003c0)={0x0, 0xe4c9, 0x0, 0x1, 0x46, 0x0, r4}, &(0x7f0000ee9000/0x2000)=nil, &(0x7f0000ee9000/0x2000)=nil, &(0x7f0000000440), &(0x7f0000000500)) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r3, 0x80089419, &(0x7f0000000000)) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r6, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000030a01020000bce02ac13bc3471200000000004db12e08fad07b570bb59f6f293d20cb996a84b8d7b000050000001400000011"], 0x3c}, 0x1, 0x0, 0x0, 0x20044014}, 0x0) 07:51:50 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009500070000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:50 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000006558000000000000", 0x32) 07:51:50 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x8100, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) [ 2188.397327][T31096] device macvlan0 entered promiscuous mode [ 2188.406859][T31096] device macvlan0 left promiscuous mode 07:51:50 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:50 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009500090000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:50 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000060000000000000", 0x32) 07:51:50 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a2c000000030a01020000000000000000050000000900010073797f30000000000c0002800800024000000000140000001100010000000000000000000000000a"], 0x54}}, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x21ce}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20040001}, 0x8081) 07:51:50 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="400000001000050700000000000000002f000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:50 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x8847, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:50 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a000000000000050000000000000095000a0000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:50 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000005865000000000000", 0x32) [ 2188.572024][T31223] validate_nla: 59 callbacks suppressed [ 2188.572109][T31223] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 2188.585909][T31223] netlink: 'syz-executor.0': attribute type 6 has an invalid length. [ 2188.611781][T31226] device macvlan0 entered promiscuous mode 07:51:50 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:50 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x7134c0, &(0x7f00000000c0)={'trans=unix,', {[{@access_uid={'access', 0x3d, r1}}, {@version_u}], [{@smackfstransmute={'smackfstransmute', 0x3d, '\x11*'}}, {@uid_eq={'uid', 0x3d, r3}}]}}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000800000000000000a2c000000030a0102000000000000000005e40fd7e3b2061217187bb77ec6460000100900010073797a30000000000c0002800800024000000000140000001100"], 0x54}}, 0x0) [ 2188.622754][T31226] device macvlan0 left promiscuous mode 07:51:50 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a000000000000050000000000000095000b0000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:50 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00000000336c000000000000", 0x32) 07:51:50 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000507000000000000000332000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:50 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x8848, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:50 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="394a0f7c390cb429aba027ac14d54d6300000064232f6b7eb23f4fce334c9042b6d27fa16b115dceb4a0aaae6a06ec66f193bc712b38c48008ab7018efe0d161720c98fa1d03782adfee5ef046c63c7492a5d996fca4121f433753854208cb684d539d552d4cf711dd2f871be05dd0f2afd2f70dd2d9e27f5e34a88cd5af7d0e9bf75551d3e78d661cd0e4b69850ae0bb172e7d45192f0ff539af8ec51460983a165b7b55662a7fa3f6f313eaa3760aa2c505396bb59a055ee885973ba3d769377a387b966a8d5f88fe61a6ffb974de7500a9bd1735d802bf29f532575e583af79ad4c3dfb5c5c0033d961b0b71c992a9154d0a85dbf6b2e0bd133ad3ea512ca4cb2", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:50 executing program 5: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="394a0f7c390cb429aba027ac14d54d6300000064232f6b7eb23f4fce334c9042b6d27fa16b115dceb4a0aaae6a06ec66f193bc712b38c48008ab7018efe0d161720c98fa1d03782adfee5ef046c63c7492a5d996fca4121f433753854208cb684d539d552d4cf711dd2f871be05dd0f2afd2f70dd2d9e27f5e34a88cd5af7d0e9bf75551d3e78d661cd0e4b69850ae0bb172e7d45192f0ff539af8ec51460983a165b7b55662a7fa3f6f313eaa3760aa2c505396bb59a055ee885973ba3d769377a387b966a8d5f88fe61a6ffb974de7500a9bd1735d802bf29f532575e583af79ad4c3dfb5c5c0033d961b0b71c992a9154d0a85dbf6b2e0bd133ad3ea512ca4cb2", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) [ 2188.743609][T31341] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 2188.751785][T31341] netlink: 'syz-executor.0': attribute type 6 has an invalid length. 07:51:50 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00000000007c000000000000", 0x32) 07:51:50 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a000000000000050000000000000095000c0000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 2188.857059][T31351] device macvlan0 entered promiscuous mode [ 2188.867582][T31351] device macvlan0 left promiscuous mode [ 2188.894366][T31354] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 07:51:50 executing program 5: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001040000000005000000000000000000000000000000840000c6e460afc24ce0ab3691e5dee7ee7c0d15aceff8c170344b96a6ea8bb8c71b6881d6992abc796510a52671c139ae77f3155abd650eb6b7a140367c4a2a3593fed1adfbd1b2559e671f3533768fe7"], 0x20}, 0x1, 0x0, 0x0, 0x40850}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r4, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r4, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r4, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r4, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r4, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) [ 2188.902496][T31354] netlink: 'syz-executor.5': attribute type 6 has an invalid length. 07:51:51 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0xba02, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:51 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000507000000000000000335000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:51 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x0) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) [ 2188.929967][T31411] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 2188.938101][T31411] netlink: 'syz-executor.0': attribute type 6 has an invalid length. 07:51:51 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000081000000000000", 0x32) 07:51:51 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a000000000000050000000000000095000d0000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:51 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) (fail_nth: 1) 07:51:51 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a000000000000050000000000000095000e0000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:51 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000004788000000000000", 0x32) 07:51:51 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x0) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:51 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0xfeff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) [ 2189.068190][T31471] device macvlan0 entered promiscuous mode [ 2189.080862][T31471] device macvlan0 left promiscuous mode [ 2189.087372][T31474] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 2189.095524][T31474] netlink: 'syz-executor.0': attribute type 6 has an invalid length. [ 2189.158218][T31482] FAULT_INJECTION: forcing a failure. [ 2189.158218][T31482] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2189.171330][T31482] CPU: 0 PID: 31482 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 2189.180154][T31482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2189.190218][T31482] Call Trace: [ 2189.193507][T31482] [ 2189.196436][T31482] dump_stack_lvl+0xd6/0x122 [ 2189.201039][T31482] dump_stack+0x11/0x1b [ 2189.205222][T31482] should_fail+0x23c/0x250 [ 2189.209652][T31482] should_fail_usercopy+0x16/0x20 [ 2189.214698][T31482] _copy_from_user+0x1c/0xd0 [ 2189.219310][T31482] sendmsg_copy_msghdr+0x60/0x2a0 [ 2189.224415][T31482] __sys_sendmsg+0x166/0x230 [ 2189.229031][T31482] __x64_sys_sendmsg+0x42/0x50 [ 2189.233847][T31482] do_syscall_64+0x44/0xd0 [ 2189.238359][T31482] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2189.244316][T31482] RIP: 0033:0x7ff47c9fab49 [ 2189.248735][T31482] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2189.268352][T31482] RSP: 002b:00007ff47bd71188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2189.276777][T31482] RAX: ffffffffffffffda RBX: 00007ff47cb0df60 RCX: 00007ff47c9fab49 [ 2189.284757][T31482] RDX: 0000000000000000 RSI: 00000000200004c0 RDI: 0000000000000003 [ 2189.292733][T31482] RBP: 00007ff47bd711d0 R08: 0000000000000000 R09: 0000000000000000 [ 2189.300777][T31482] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 07:51:51 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0xff0f, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:51 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0xfffe, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:51 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) (fail_nth: 2) [ 2189.308821][T31482] R13: 00007ffd99b2426f R14: 00007ff47bd71300 R15: 0000000000022000 [ 2189.316809][T31482] 07:51:51 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="400000001000050700000000000000003a000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:51 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009500110000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:51 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000004888000000000000", 0x32) 07:51:51 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x0) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:51 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009500120000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 2189.469647][T31612] FAULT_INJECTION: forcing a failure. [ 2189.469647][T31612] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2189.482764][T31612] CPU: 0 PID: 31612 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 2189.491584][T31612] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2189.501643][T31612] Call Trace: [ 2189.504928][T31612] [ 2189.507881][T31612] dump_stack_lvl+0xd6/0x122 [ 2189.512556][T31612] dump_stack+0x11/0x1b [ 2189.516729][T31612] should_fail+0x23c/0x250 [ 2189.521158][T31612] should_fail_usercopy+0x16/0x20 [ 2189.526197][T31612] _copy_from_user+0x1c/0xd0 [ 2189.530811][T31612] iovec_from_user+0xc4/0x2e0 [ 2189.535511][T31612] __import_iovec+0x57/0x2d0 [ 2189.540118][T31612] import_iovec+0xb8/0xd0 [ 2189.544540][T31612] sendmsg_copy_msghdr+0x275/0x2a0 [ 2189.549720][T31612] __sys_sendmsg+0x166/0x230 [ 2189.554401][T31612] __x64_sys_sendmsg+0x42/0x50 [ 2189.559252][T31612] do_syscall_64+0x44/0xd0 [ 2189.563765][T31612] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2189.569677][T31612] RIP: 0033:0x7ff47c9fab49 [ 2189.574096][T31612] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2189.593722][T31612] RSP: 002b:00007ff47bd71188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2189.602146][T31612] RAX: ffffffffffffffda RBX: 00007ff47cb0df60 RCX: 00007ff47c9fab49 [ 2189.610125][T31612] RDX: 0000000000000000 RSI: 00000000200004c0 RDI: 0000000000000003 07:51:51 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x34000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:51 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009500180000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:51 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a000000000000050000000000000095021a0000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:51 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000ec0000000000000", 0x32) 07:51:51 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="400000001000050700000000000000013b000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:51 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) (fail_nth: 3) [ 2189.618154][T31612] RBP: 00007ff47bd711d0 R08: 0000000000000000 R09: 0000000000000000 [ 2189.626132][T31612] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2189.634110][T31612] R13: 00007ffd99b2426f R14: 00007ff47bd71300 R15: 0000000000022000 [ 2189.642089][T31612] 07:51:51 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="394a0f7c390cb429aba027ac14d54d6300000064232f6b7eb23f4fce334c9042b6d27fa16b115dceb4a0aaae6a06ec66f193bc712b38c48008ab7018efe0d161720c98fa1d03782adfee5ef046c63c7492a5d996fca4121f433753854208cb684d539d552d4cf711dd2f871be05dd0f2afd2f70dd2d9e27f5e34a88cd5af7d0e9bf75551d3e78d661cd0e4b69850ae0bb172e7d45192f0ff539af8ec51460983a165b7b55662a7fa3f6f313eaa3760aa2c505396bb59a055ee885973ba3d769377a387b966a8d5f88fe61a6ffb974de7500a9bd1735d802bf29f532575e583af79ad4c3dfb5c5c0033d961b0b71c992a9154d0a85dbf6b2e0bd133ad3ea512ca4cb2", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:51 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x400300, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:51 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009500200000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 2189.777144][T31832] device macvlan0 entered promiscuous mode [ 2189.785173][T31832] device macvlan0 left promiscuous mode [ 2189.794208][T31834] FAULT_INJECTION: forcing a failure. [ 2189.794208][T31834] name failslab, interval 1, probability 0, space 0, times 0 [ 2189.806935][T31834] CPU: 1 PID: 31834 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 2189.815707][T31834] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2189.825821][T31834] Call Trace: [ 2189.829095][T31834] [ 2189.832022][T31834] dump_stack_lvl+0xd6/0x122 [ 2189.836618][T31834] dump_stack+0x11/0x1b [ 2189.840773][T31834] should_fail+0x23c/0x250 [ 2189.845260][T31834] __should_failslab+0x81/0x90 [ 2189.850028][T31834] should_failslab+0x5/0x20 [ 2189.854567][T31834] kmem_cache_alloc_node+0x61/0x2d0 [ 2189.859779][T31834] ? __alloc_skb+0xf0/0x450 [ 2189.864308][T31834] __alloc_skb+0xf0/0x450 [ 2189.868670][T31834] netlink_sendmsg+0x4fe/0x840 [ 2189.873449][T31834] ? netlink_getsockopt+0x720/0x720 [ 2189.878692][T31834] ____sys_sendmsg+0x39a/0x510 [ 2189.883513][T31834] __sys_sendmsg+0x195/0x230 [ 2189.888156][T31834] __x64_sys_sendmsg+0x42/0x50 [ 2189.892935][T31834] do_syscall_64+0x44/0xd0 [ 2189.897390][T31834] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2189.903355][T31834] RIP: 0033:0x7ff47c9fab49 [ 2189.907867][T31834] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2189.927574][T31834] RSP: 002b:00007ff47bd71188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2189.936069][T31834] RAX: ffffffffffffffda RBX: 00007ff47cb0df60 RCX: 00007ff47c9fab49 [ 2189.944045][T31834] RDX: 0000000000000000 RSI: 00000000200004c0 RDI: 0000000000000003 [ 2189.952024][T31834] RBP: 00007ff47bd711d0 R08: 0000000000000000 R09: 0000000000000000 [ 2189.959998][T31834] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2189.968055][T31834] R13: 00007ffd99b2426f R14: 00007ff47bd71300 R15: 0000000000022000 07:51:52 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000040030000000000", 0x32) 07:51:52 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) (fail_nth: 4) [ 2189.976040][T31834] 07:51:52 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:52 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x1000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:52 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="400000001000050700000000000000003f000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:52 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009500250000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:52 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00000000ac14140000000000", 0x32) [ 2190.148607][T31948] FAULT_INJECTION: forcing a failure. [ 2190.148607][T31948] name failslab, interval 1, probability 0, space 0, times 0 [ 2190.161393][T31948] CPU: 0 PID: 31948 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 2190.170167][T31948] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2190.180235][T31948] Call Trace: [ 2190.183556][T31948] [ 2190.186497][T31948] dump_stack_lvl+0xd6/0x122 [ 2190.191107][T31948] dump_stack+0x11/0x1b 07:51:52 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000003400000000000", 0x32) [ 2190.195300][T31948] should_fail+0x23c/0x250 [ 2190.199813][T31948] __should_failslab+0x81/0x90 [ 2190.204645][T31948] should_failslab+0x5/0x20 [ 2190.209169][T31948] kmem_cache_alloc_node_trace+0x61/0x310 [ 2190.214924][T31948] ? __kmalloc_node_track_caller+0x30/0x40 [ 2190.220760][T31948] __kmalloc_node_track_caller+0x30/0x40 [ 2190.226477][T31948] ? netlink_sendmsg+0x4fe/0x840 [ 2190.231475][T31948] __alloc_skb+0x19d/0x450 [ 2190.235955][T31948] netlink_sendmsg+0x4fe/0x840 [ 2190.240739][T31948] ? netlink_getsockopt+0x720/0x720 [ 2190.245968][T31948] ____sys_sendmsg+0x39a/0x510 [ 2190.250840][T31948] __sys_sendmsg+0x195/0x230 [ 2190.255515][T31948] __x64_sys_sendmsg+0x42/0x50 [ 2190.260296][T31948] do_syscall_64+0x44/0xd0 [ 2190.264726][T31948] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2190.270632][T31948] RIP: 0033:0x7ff47c9fab49 [ 2190.275048][T31948] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 07:51:52 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009500400000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:52 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) (fail_nth: 5) [ 2190.294916][T31948] RSP: 002b:00007ff47bd71188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2190.303376][T31948] RAX: ffffffffffffffda RBX: 00007ff47cb0df60 RCX: 00007ff47c9fab49 [ 2190.311369][T31948] RDX: 0000000000000000 RSI: 00000000200004c0 RDI: 0000000000000003 [ 2190.319345][T31948] RBP: 00007ff47bd711d0 R08: 0000000000000000 R09: 0000000000000000 [ 2190.327326][T31948] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2190.335308][T31948] R13: 00007ffd99b2426f R14: 00007ff47bd71300 R15: 0000000000022000 [ 2190.343292][T31948] 07:51:52 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000000100000000", 0x32) 07:51:52 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:52 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x2000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:52 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009500480000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 2190.390029][T31960] device macvlan0 entered promiscuous mode [ 2190.409541][T31960] device macvlan0 left promiscuous mode [ 2190.458767][T31969] FAULT_INJECTION: forcing a failure. [ 2190.458767][T31969] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2190.471929][T31969] CPU: 0 PID: 31969 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 2190.480706][T31969] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2190.491060][T31969] Call Trace: [ 2190.494342][T31969] [ 2190.497353][T31969] dump_stack_lvl+0xd6/0x122 [ 2190.501962][T31969] dump_stack+0x11/0x1b 07:51:52 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a000000000000050000000000000095004c0000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 2190.506203][T31969] should_fail+0x23c/0x250 [ 2190.510699][T31969] should_fail_usercopy+0x16/0x20 [ 2190.515759][T31969] _copy_from_iter+0x131/0x990 [ 2190.520990][T31969] ? check_stack_object+0x61/0x70 [ 2190.526047][T31969] ? __virt_addr_valid+0x15a/0x1a0 [ 2190.531202][T31969] ? __check_object_size+0x253/0x310 [ 2190.536504][T31969] netlink_sendmsg+0x5bb/0x840 [ 2190.541298][T31969] ? netlink_getsockopt+0x720/0x720 [ 2190.546556][T31969] ____sys_sendmsg+0x39a/0x510 [ 2190.551348][T31969] __sys_sendmsg+0x195/0x230 [ 2190.555992][T31969] __x64_sys_sendmsg+0x42/0x50 [ 2190.560777][T31969] do_syscall_64+0x44/0xd0 [ 2190.565231][T31969] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2190.571228][T31969] RIP: 0033:0x7ff47c9fab49 [ 2190.575648][T31969] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2190.595332][T31969] RSP: 002b:00007ff47bd71188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 07:51:52 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000507000000000000000040000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:52 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00000000ac14140100000000", 0x32) 07:51:52 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) (fail_nth: 6) 07:51:52 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x3000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) [ 2190.603836][T31969] RAX: ffffffffffffffda RBX: 00007ff47cb0df60 RCX: 00007ff47c9fab49 [ 2190.611814][T31969] RDX: 0000000000000000 RSI: 00000000200004c0 RDI: 0000000000000003 [ 2190.619825][T31969] RBP: 00007ff47bd711d0 R08: 0000000000000000 R09: 0000000000000000 [ 2190.627804][T31969] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2190.635784][T31969] R13: 00007ffd99b2426f R14: 00007ff47bd71300 R15: 0000000000022000 [ 2190.643769][T31969] 07:51:52 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a000000000000050000000000000095ff600000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:52 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) [ 2190.772892][T32188] FAULT_INJECTION: forcing a failure. [ 2190.772892][T32188] name failslab, interval 1, probability 0, space 0, times 0 [ 2190.785575][T32188] CPU: 0 PID: 32188 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 2190.794460][T32188] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2190.804522][T32188] Call Trace: [ 2190.807811][T32188] [ 2190.810744][T32188] dump_stack_lvl+0xd6/0x122 [ 2190.815385][T32188] dump_stack+0x11/0x1b 07:51:52 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009500680000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 2190.819903][T32188] should_fail+0x23c/0x250 [ 2190.824341][T32188] ? skb_clone+0x12c/0x1f0 [ 2190.828790][T32188] __should_failslab+0x81/0x90 [ 2190.833575][T32188] should_failslab+0x5/0x20 [ 2190.838109][T32188] kmem_cache_alloc+0x4f/0x320 [ 2190.842884][T32188] skb_clone+0x12c/0x1f0 [ 2190.847146][T32188] netlink_deliver_tap+0x2da/0x510 [ 2190.852278][T32188] netlink_unicast+0x5de/0x6c0 [ 2190.857057][T32188] netlink_sendmsg+0x726/0x840 [ 2190.861843][T32188] ? netlink_getsockopt+0x720/0x720 [ 2190.867070][T32188] ____sys_sendmsg+0x39a/0x510 [ 2190.871859][T32188] __sys_sendmsg+0x195/0x230 [ 2190.876478][T32188] __x64_sys_sendmsg+0x42/0x50 [ 2190.881261][T32188] do_syscall_64+0x44/0xd0 [ 2190.885764][T32188] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2190.891674][T32188] RIP: 0033:0x7ff47c9fab49 [ 2190.896114][T32188] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 07:51:53 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x4000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) [ 2190.915873][T32188] RSP: 002b:00007ff47bd71188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2190.924290][T32188] RAX: ffffffffffffffda RBX: 00007ff47cb0df60 RCX: 00007ff47c9fab49 [ 2190.932272][T32188] RDX: 0000000000000000 RSI: 00000000200004c0 RDI: 0000000000000003 [ 2190.940253][T32188] RBP: 00007ff47bd711d0 R08: 0000000000000000 R09: 0000000000000000 [ 2190.948267][T32188] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2190.956427][T32188] R13: 00007ffd99b2426f R14: 00007ff47bd71300 R15: 0000000000022000 [ 2190.964417][T32188] 07:51:53 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) (fail_nth: 7) 07:51:53 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a000000000000050000000000000095006c0000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:53 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000000200000000", 0x32) [ 2190.978859][T32197] device macvlan0 entered promiscuous mode [ 2190.993540][T32197] device macvlan0 left promiscuous mode 07:51:53 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="394a0f7c390cb429aba027ac14d54d6300000064232f6b7eb23f4fce334c9042b6d27fa16b115dceb4a0aaae6a06ec66f193bc712b38c48008ab7018efe0d161720c98fa1d03782adfee5ef046c63c7492a5d996fca4121f433753854208cb684d539d552d4cf711dd2f871be05dd0f2afd2f70dd2d9e27f5e34a88cd5af7d0e9bf75551d3e78d661cd0e4b69850ae0bb172e7d45192f0ff539af8ec51460983a165b7b55662a7fa3f6f313eaa3760aa2c505396bb59a055ee885973ba3d769377a387b966a8d5f88fe61a6ffb974de7500a9bd1735d802bf29f532575e583af79ad4c3dfb5c5c0033d961b0b71c992a9154d0a85dbf6b2e0bd133ad3ea512ca4cb2", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:53 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000507000000000000000044000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:53 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x5000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) [ 2191.121081][T32417] FAULT_INJECTION: forcing a failure. [ 2191.121081][T32417] name failslab, interval 1, probability 0, space 0, times 0 [ 2191.133756][T32417] CPU: 0 PID: 32417 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 2191.142525][T32417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2191.152624][T32417] Call Trace: [ 2191.155902][T32417] [ 2191.158857][T32417] dump_stack_lvl+0xd6/0x122 [ 2191.163460][T32417] dump_stack+0x11/0x1b [ 2191.167652][T32417] should_fail+0x23c/0x250 [ 2191.172067][T32417] ? skb_clone+0x12c/0x1f0 [ 2191.176507][T32417] __should_failslab+0x81/0x90 [ 2191.181315][T32417] should_failslab+0x5/0x20 [ 2191.185824][T32417] kmem_cache_alloc+0x4f/0x320 [ 2191.190643][T32417] skb_clone+0x12c/0x1f0 [ 2191.194902][T32417] nfnetlink_rcv+0x2eb/0x13c0 [ 2191.199591][T32417] ? __kfree_skb+0xfe/0x150 [ 2191.204103][T32417] ? consume_skb+0x48/0x160 [ 2191.208816][T32417] ? nlmon_xmit+0x5f/0x70 [ 2191.213203][T32417] ? __this_cpu_preempt_check+0x18/0x20 [ 2191.218762][T32417] ? __local_bh_enable_ip+0x4d/0x70 [ 2191.223975][T32417] ? local_bh_enable+0x1b/0x20 [ 2191.228739][T32417] ? __dev_queue_xmit+0x597/0xf70 [ 2191.233832][T32417] ? __skb_clone+0x2db/0x300 [ 2191.238433][T32417] ? __rcu_read_unlock+0x5c/0x290 [ 2191.243462][T32417] ? netlink_deliver_tap+0x74/0x510 [ 2191.248732][T32417] netlink_unicast+0x5fc/0x6c0 [ 2191.253577][T32417] netlink_sendmsg+0x726/0x840 [ 2191.258368][T32417] ? netlink_getsockopt+0x720/0x720 [ 2191.263592][T32417] ____sys_sendmsg+0x39a/0x510 [ 2191.268469][T32417] __sys_sendmsg+0x195/0x230 [ 2191.273132][T32417] __x64_sys_sendmsg+0x42/0x50 [ 2191.277916][T32417] do_syscall_64+0x44/0xd0 [ 2191.282377][T32417] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2191.288294][T32417] RIP: 0033:0x7ff47c9fab49 [ 2191.292726][T32417] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2191.312345][T32417] RSP: 002b:00007ff47bd71188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 07:51:53 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) (fail_nth: 8) 07:51:53 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009500740000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:53 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000000300000000", 0x32) [ 2191.320836][T32417] RAX: ffffffffffffffda RBX: 00007ff47cb0df60 RCX: 00007ff47c9fab49 [ 2191.328826][T32417] RDX: 0000000000000000 RSI: 00000000200004c0 RDI: 0000000000000003 [ 2191.336812][T32417] RBP: 00007ff47bd711d0 R08: 0000000000000000 R09: 0000000000000000 [ 2191.344794][T32417] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2191.352772][T32417] R13: 00007ffd99b2426f R14: 00007ff47bd71300 R15: 0000000000022000 [ 2191.360760][T32417] 07:51:53 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:53 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x6000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) [ 2191.405776][T32526] device macvlan0 entered promiscuous mode [ 2191.423273][T32526] device macvlan0 left promiscuous mode [ 2191.474086][T32548] FAULT_INJECTION: forcing a failure. [ 2191.474086][T32548] name failslab, interval 1, probability 0, space 0, times 0 [ 2191.486802][T32548] CPU: 0 PID: 32548 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 2191.495571][T32548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2191.505677][T32548] Call Trace: [ 2191.509014][T32548] [ 2191.511936][T32548] dump_stack_lvl+0xd6/0x122 [ 2191.516610][T32548] dump_stack+0x11/0x1b [ 2191.521187][T32548] should_fail+0x23c/0x250 [ 2191.525609][T32548] ? nfnetlink_rcv+0x8eb/0x13c0 [ 2191.530476][T32548] __should_failslab+0x81/0x90 [ 2191.535389][T32548] should_failslab+0x5/0x20 [ 2191.539903][T32548] kmem_cache_alloc_trace+0x52/0x350 [ 2191.545207][T32548] ? __nla_parse+0x3c/0x50 [ 2191.549688][T32548] nfnetlink_rcv+0x8eb/0x13c0 [ 2191.554394][T32548] netlink_unicast+0x5fc/0x6c0 [ 2191.559176][T32548] netlink_sendmsg+0x726/0x840 [ 2191.564085][T32548] ? netlink_getsockopt+0x720/0x720 [ 2191.569360][T32548] ____sys_sendmsg+0x39a/0x510 [ 2191.574199][T32548] __sys_sendmsg+0x195/0x230 [ 2191.578823][T32548] __x64_sys_sendmsg+0x42/0x50 [ 2191.583614][T32548] do_syscall_64+0x44/0xd0 [ 2191.588052][T32548] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2191.593960][T32548] RIP: 0033:0x7ff47c9fab49 [ 2191.598390][T32548] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 07:51:53 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000507000000000000000046000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:53 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x7000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:53 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000000400000000", 0x32) 07:51:53 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a000000000000050000000000000095007a0000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 2191.618034][T32548] RSP: 002b:00007ff47bd71188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2191.626483][T32548] RAX: ffffffffffffffda RBX: 00007ff47cb0df60 RCX: 00007ff47c9fab49 [ 2191.634459][T32548] RDX: 0000000000000000 RSI: 00000000200004c0 RDI: 0000000000000003 [ 2191.642514][T32548] RBP: 00007ff47bd711d0 R08: 0000000000000000 R09: 0000000000000000 [ 2191.650561][T32548] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2191.658541][T32548] R13: 00007ffd99b2426f R14: 00007ff47bd71300 R15: 0000000000022000 [ 2191.666535][T32548] 07:51:53 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) (fail_nth: 9) 07:51:53 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) [ 2191.742712][T32646] device macvlan0 entered promiscuous mode [ 2191.749251][T32646] device macvlan0 left promiscuous mode 07:51:53 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a000000000000050000000000000095008a0000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 2191.830087][T32758] FAULT_INJECTION: forcing a failure. [ 2191.830087][T32758] name failslab, interval 1, probability 0, space 0, times 0 [ 2191.842788][T32758] CPU: 0 PID: 32758 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 2191.851621][T32758] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2191.861769][T32758] Call Trace: [ 2191.865080][T32758] [ 2191.868026][T32758] dump_stack_lvl+0xd6/0x122 [ 2191.872630][T32758] dump_stack+0x11/0x1b 07:51:53 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000000500000000", 0x32) 07:51:53 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000507000000000000000048000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) [ 2191.876835][T32758] should_fail+0x23c/0x250 [ 2191.881255][T32758] __should_failslab+0x81/0x90 [ 2191.886143][T32758] should_failslab+0x5/0x20 [ 2191.890718][T32758] kmem_cache_alloc_node+0x61/0x2d0 [ 2191.895934][T32758] ? __alloc_skb+0xf0/0x450 [ 2191.900492][T32758] __alloc_skb+0xf0/0x450 [ 2191.904915][T32758] netlink_ack+0x292/0x680 [ 2191.909346][T32758] ? __rcu_read_unlock+0x5c/0x290 [ 2191.914458][T32758] nfnetlink_rcv+0x125d/0x13c0 [ 2191.919243][T32758] netlink_unicast+0x5fc/0x6c0 [ 2191.924021][T32758] netlink_sendmsg+0x726/0x840 [ 2191.928929][T32758] ? netlink_getsockopt+0x720/0x720 [ 2191.934152][T32758] ____sys_sendmsg+0x39a/0x510 [ 2191.938941][T32758] __sys_sendmsg+0x195/0x230 [ 2191.943588][T32758] __x64_sys_sendmsg+0x42/0x50 [ 2191.948377][T32758] do_syscall_64+0x44/0xd0 [ 2191.952812][T32758] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2191.958723][T32758] RIP: 0033:0x7ff47c9fab49 07:51:54 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) [ 2191.963178][T32758] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2191.982824][T32758] RSP: 002b:00007ff47bd71188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2191.991246][T32758] RAX: ffffffffffffffda RBX: 00007ff47cb0df60 RCX: 00007ff47c9fab49 [ 2191.999219][T32758] RDX: 0000000000000000 RSI: 00000000200004c0 RDI: 0000000000000003 [ 2192.007246][T32758] RBP: 00007ff47bd711d0 R08: 0000000000000000 R09: 0000000000000000 [ 2192.015227][T32758] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2192.023230][T32758] R13: 00007ffd99b2426f R14: 00007ff47bd71300 R15: 0000000000022000 07:51:54 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x8000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:54 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009503bc0000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:54 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) (fail_nth: 10) [ 2192.031220][T32758] 07:51:54 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="394a0f7c390cb429aba027ac14d54d6300000064232f6b7eb23f4fce334c9042b6d27fa16b115dceb4a0aaae6a06ec66f193bc712b38c48008ab7018efe0d161720c98fa1d03782adfee5ef046c63c7492a5d996fca4121f433753854208cb684d539d552d4cf711dd2f871be05dd0f2afd2f70dd2d9e27f5e34a88cd5af7d0e9bf75551d3e78d661cd0e4b69850ae0bb172e7d45192f0ff539af8ec51460983a165b7b55662a7fa3f6f313eaa3760aa2c505396bb59a055ee885973ba3d769377a387b966a8d5f88fe61a6ffb974de7500a9bd1735d802bf29f532575e583af79ad4c3dfb5c5c0033d961b0b71c992a9154d0a85dbf6b2e0bd133ad3ea512ca4cb2", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:54 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000000600000000", 0x32) [ 2192.077563][T32767] device macvlan0 entered promiscuous mode [ 2192.095583][T32767] device macvlan0 left promiscuous mode 07:51:54 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009501e50000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 2192.164167][ T308] FAULT_INJECTION: forcing a failure. [ 2192.164167][ T308] name failslab, interval 1, probability 0, space 0, times 0 [ 2192.176901][ T308] CPU: 0 PID: 308 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 2192.185507][ T308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2192.195652][ T308] Call Trace: [ 2192.198934][ T308] [ 2192.201867][ T308] dump_stack_lvl+0xd6/0x122 [ 2192.206491][ T308] dump_stack+0x11/0x1b 07:51:54 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000000700000000", 0x32) [ 2192.210658][ T308] should_fail+0x23c/0x250 [ 2192.215094][ T308] __should_failslab+0x81/0x90 [ 2192.219887][ T308] should_failslab+0x5/0x20 [ 2192.224415][ T308] kmem_cache_alloc_node_trace+0x61/0x310 [ 2192.230180][ T308] ? __kmalloc_node_track_caller+0x30/0x40 [ 2192.236090][ T308] __kmalloc_node_track_caller+0x30/0x40 [ 2192.241751][ T308] ? netlink_ack+0x292/0x680 [ 2192.246416][ T308] __alloc_skb+0x19d/0x450 [ 2192.250858][ T308] netlink_ack+0x292/0x680 [ 2192.255326][ T308] ? __rcu_read_unlock+0x5c/0x290 [ 2192.260444][ T308] nfnetlink_rcv+0x125d/0x13c0 [ 2192.265256][ T308] netlink_unicast+0x5fc/0x6c0 [ 2192.270067][ T308] netlink_sendmsg+0x726/0x840 [ 2192.274888][ T308] ? netlink_getsockopt+0x720/0x720 [ 2192.280160][ T308] ____sys_sendmsg+0x39a/0x510 [ 2192.285072][ T308] __sys_sendmsg+0x195/0x230 [ 2192.289708][ T308] __x64_sys_sendmsg+0x42/0x50 [ 2192.294492][ T308] do_syscall_64+0x44/0xd0 [ 2192.298999][ T308] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2192.304950][ T308] RIP: 0033:0x7ff47c9fab49 07:51:54 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000000800000000", 0x32) [ 2192.309381][ T308] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2192.329038][ T308] RSP: 002b:00007ff47bd71188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2192.337488][ T308] RAX: ffffffffffffffda RBX: 00007ff47cb0df60 RCX: 00007ff47c9fab49 [ 2192.345470][ T308] RDX: 0000000000000000 RSI: 00000000200004c0 RDI: 0000000000000003 [ 2192.353455][ T308] RBP: 00007ff47bd711d0 R08: 0000000000000000 R09: 0000000000000000 07:51:54 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="400000001000050700000000000000004a000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:54 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009500ff0000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:54 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x9000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:54 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) (fail_nth: 11) [ 2192.361432][ T308] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2192.369424][ T308] R13: 00007ffd99b2426f R14: 00007ff47bd71300 R15: 0000000000022000 [ 2192.377420][ T308] 07:51:54 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000000900000000", 0x32) 07:51:54 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:54 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a000000000000050000000000000095e6d61e00000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 2192.520265][ T432] device macvlan0 entered promiscuous mode [ 2192.534256][ T435] FAULT_INJECTION: forcing a failure. [ 2192.534256][ T435] name failslab, interval 1, probability 0, space 0, times 0 [ 2192.547028][ T435] CPU: 1 PID: 435 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 2192.555672][ T435] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2192.565798][ T435] Call Trace: [ 2192.569091][ T435] [ 2192.572021][ T435] dump_stack_lvl+0xd6/0x122 [ 2192.576714][ T435] dump_stack+0x11/0x1b [ 2192.580875][ T435] should_fail+0x23c/0x250 [ 2192.585308][ T435] ? skb_clone+0x12c/0x1f0 [ 2192.589744][ T435] __should_failslab+0x81/0x90 [ 2192.594529][ T435] should_failslab+0x5/0x20 [ 2192.599191][ T435] kmem_cache_alloc+0x4f/0x320 [ 2192.604064][ T435] skb_clone+0x12c/0x1f0 [ 2192.608327][ T435] netlink_deliver_tap+0x2da/0x510 [ 2192.613483][ T435] netlink_unicast+0x427/0x6c0 [ 2192.618275][ T435] netlink_ack+0x62e/0x680 [ 2192.622779][ T435] nfnetlink_rcv+0x125d/0x13c0 [ 2192.627596][ T435] netlink_unicast+0x5fc/0x6c0 [ 2192.632417][ T435] netlink_sendmsg+0x726/0x840 [ 2192.637286][ T435] ? netlink_getsockopt+0x720/0x720 [ 2192.642495][ T435] ____sys_sendmsg+0x39a/0x510 [ 2192.647339][ T435] __sys_sendmsg+0x195/0x230 [ 2192.651941][ T435] __x64_sys_sendmsg+0x42/0x50 [ 2192.656718][ T435] do_syscall_64+0x44/0xd0 [ 2192.661213][ T435] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2192.667120][ T435] RIP: 0033:0x7ff47c9fab49 [ 2192.671534][ T435] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2192.691285][ T435] RSP: 002b:00007ff47bd71188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2192.699790][ T435] RAX: ffffffffffffffda RBX: 00007ff47cb0df60 RCX: 00007ff47c9fab49 [ 2192.707804][ T435] RDX: 0000000000000000 RSI: 00000000200004c0 RDI: 0000000000000003 07:51:54 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) (fail_nth: 12) 07:51:54 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0xa000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) [ 2192.715864][ T435] RBP: 00007ff47bd711d0 R08: 0000000000000000 R09: 0000000000000000 [ 2192.723834][ T435] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2192.731807][ T435] R13: 00007ffd99b2426f R14: 00007ff47bd71300 R15: 0000000000022000 [ 2192.739788][ T435] [ 2192.748397][ T432] device macvlan0 left promiscuous mode 07:51:54 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000000a00000000", 0x32) 07:51:54 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="400000001000050700000000000000004c000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:54 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:55 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009500002000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:55 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0xb000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) [ 2192.966147][ T552] FAULT_INJECTION: forcing a failure. [ 2192.966147][ T552] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2192.979400][ T552] CPU: 0 PID: 552 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 2192.988002][ T552] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2192.998071][ T552] Call Trace: [ 2193.001553][ T552] [ 2193.004512][ T552] dump_stack_lvl+0xd6/0x122 [ 2193.009153][ T552] dump_stack+0x11/0x1b [ 2193.013307][ T552] should_fail+0x23c/0x250 [ 2193.017746][ T552] should_fail_usercopy+0x16/0x20 [ 2193.022781][ T552] _copy_to_user+0x1c/0x90 [ 2193.027263][ T552] simple_read_from_buffer+0xab/0x120 [ 2193.032697][ T552] proc_fail_nth_read+0x10d/0x150 [ 2193.037776][ T552] ? proc_fault_inject_write+0x230/0x230 [ 2193.043429][ T552] vfs_read+0x1e6/0x750 [ 2193.047611][ T552] ? __fget_files+0x20d/0x220 [ 2193.052424][ T552] ksys_read+0xd9/0x190 [ 2193.056596][ T552] __x64_sys_read+0x3e/0x50 [ 2193.061194][ T552] do_syscall_64+0x44/0xd0 [ 2193.065721][ T552] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2193.071658][ T552] RIP: 0033:0x7ff47c9ad6fc [ 2193.076079][ T552] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2193.095697][ T552] RSP: 002b:00007ff47bd71170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2193.104167][ T552] RAX: ffffffffffffffda RBX: 0000000000000060 RCX: 00007ff47c9ad6fc 07:51:55 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) [ 2193.112154][ T552] RDX: 000000000000000f RSI: 00007ff47bd711e0 RDI: 0000000000000004 [ 2193.120133][ T552] RBP: 00007ff47bd711d0 R08: 0000000000000000 R09: 0000000000000000 [ 2193.128151][ T552] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2193.136125][ T552] R13: 00007ffd99b2426f R14: 00007ff47bd71300 R15: 0000000000022000 [ 2193.144118][ T552] 07:51:55 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000000b00000000", 0x32) 07:51:55 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="394a0f7c390cb429aba027ac14d54d6300000064232f6b7eb23f4fce334c9042b6d27fa16b115dceb4a0aaae6a06ec66f193bc712b38c48008ab7018efe0d161720c98fa1d03782adfee5ef046c63c7492a5d996fca4121f433753854208cb684d539d552d4cf711dd2f871be05dd0f2afd2f70dd2d9e27f5e34a88cd5af7d0e9bf75551d3e78d661cd0e4b69850ae0bb172e7d45192f0ff539af8ec51460983a165b7b55662a7fa3f6f313eaa3760aa2c505396bb59a055ee885973ba3d769377a387b966a8d5f88fe61a6ffb974de7500a9bd1735d802bf29f532575e583af79ad4c3dfb5c5c0033d961b0b71c992a9154d0a85dbf6b2e0bd133ad3ea512ca4cb2", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) [ 2193.185281][ T559] device macvlan0 entered promiscuous mode [ 2193.197038][ T559] device macvlan0 left promiscuous mode 07:51:55 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009500000001000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:55 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000000c00000000", 0x32) 07:51:55 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0xc000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:55 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) 07:51:55 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000507000000000000000052000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:55 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:55 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009500000002000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:55 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000000d00000000", 0x32) 07:51:55 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x2, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) 07:51:55 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:55 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0xd000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:55 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009500000003000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 2193.451747][ T687] device macvlan0 entered promiscuous mode [ 2193.468882][ T687] device macvlan0 left promiscuous mode 07:51:55 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="400000001000050700000000000000d954000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:55 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x3, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) 07:51:55 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000000e00000000", 0x32) 07:51:55 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) [ 2193.584358][ T800] validate_nla: 37 callbacks suppressed [ 2193.584377][ T800] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 2193.598104][ T800] netlink: 'syz-executor.0': attribute type 6 has an invalid length. 07:51:55 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009500000004000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:55 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0xe000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:55 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000000f00000000", 0x32) 07:51:55 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x4, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) 07:51:55 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009500000005000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:55 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="394a0f7c390cb429aba027ac14d54d6300000064232f6b7eb23f4fce334c9042b6d27fa16b115dceb4a0aaae6a06ec66f193bc712b38c48008ab7018efe0d161720c98fa1d03782adfee5ef046c63c7492a5d996fca4121f433753854208cb684d539d552d4cf711dd2f871be05dd0f2afd2f70dd2d9e27f5e34a88cd5af7d0e9bf75551d3e78d661cd0e4b69850ae0bb172e7d45192f0ff539af8ec51460983a165b7b55662a7fa3f6f313eaa3760aa2c505396bb59a055ee885973ba3d769377a387b966a8d5f88fe61a6ffb974de7500a9bd1735d802bf29f532575e583af79ad4c3dfb5c5c0033d961b0b71c992a9154d0a85dbf6b2e0bd133ad3ea512ca4cb2", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) [ 2193.710396][ T812] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 2193.724008][ T813] device macvlan0 entered promiscuous mode [ 2193.731275][ T813] device macvlan0 left promiscuous mode [ 2193.741563][ T816] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 2193.749696][ T816] netlink: 'syz-executor.0': attribute type 6 has an invalid length. 07:51:55 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0xf000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:55 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000507000000000000000058000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:55 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000001000000000", 0x32) 07:51:55 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x5, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) 07:51:55 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009500000006000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:56 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="394a0f7c390cb429aba027ac14d54d6300000064232f6b7eb23f4fce334c9042b6d27fa16b115dceb4a0aaae6a06ec66f193bc712b38c48008ab7018efe0d161720c98fa1d03782adfee5ef046c63c7492a5d996fca4121f433753854208cb684d539d552d4cf711dd2f871be05dd0f2afd2f70dd2d9e27f5e34a88cd5af7d0e9bf75551d3e78d661cd0e4b69850ae0bb172e7d45192f0ff539af8ec51460983a165b7b55662a7fa3f6f313eaa3760aa2c505396bb59a055ee885973ba3d769377a387b966a8d5f88fe61a6ffb974de7500a9bd1735d802bf29f532575e583af79ad4c3dfb5c5c0033d961b0b71c992a9154d0a85dbf6b2e0bd133ad3ea512ca4cb2", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) [ 2193.888552][ T930] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 2193.912784][ T933] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 2193.920960][ T933] netlink: 'syz-executor.0': attribute type 6 has an invalid length. 07:51:56 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x10000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) [ 2193.969305][ T940] device macvlan0 entered promiscuous mode [ 2193.980958][ T940] device macvlan0 left promiscuous mode 07:51:56 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000001100000000", 0x32) 07:51:56 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x6, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) 07:51:56 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000507000000000000000060000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:56 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009500000007000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:56 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) [ 2194.030274][ T947] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 2194.068560][ T1032] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 07:51:56 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x11000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:56 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000001200000000", 0x32) 07:51:56 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x7, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) 07:51:56 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009500000008000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:56 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) [ 2194.206666][ T1067] device macvlan0 entered promiscuous mode [ 2194.219397][ T1067] device macvlan0 left promiscuous mode 07:51:56 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x12000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:56 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000507000000000000000066000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:56 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000001300000000", 0x32) 07:51:56 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x8, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) 07:51:56 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009500000009000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:56 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:56 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x25000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:56 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x9, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) 07:51:56 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a0000000000000500000000000000950000000a000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:56 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="394a0f7c390cb429aba027ac14d54d6300000064232f6b7eb23f4fce334c9042b6d27fa16b115dceb4a0aaae6a06ec66f193bc712b38c48008ab7018efe0d161720c98fa1d03782adfee5ef046c63c7492a5d996fca4121f433753854208cb684d539d552d4cf711dd2f871be05dd0f2afd2f70dd2d9e27f5e34a88cd5af7d0e9bf75551d3e78d661cd0e4b69850ae0bb172e7d45192f0ff539af8ec51460983a165b7b55662a7fa3f6f313eaa3760aa2c505396bb59a055ee885973ba3d769377a387b966a8d5f88fe61a6ffb974de7500a9bd1735d802bf29f532575e583af79ad4c3dfb5c5c0033d961b0b71c992a9154d0a85dbf6b2e0bd133ad3ea512ca4cb2", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:56 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000001400000000", 0x32) [ 2194.431338][ T1208] device macvlan0 entered promiscuous mode [ 2194.453455][ T1208] device macvlan0 left promiscuous mode 07:51:56 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0xf, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) 07:51:56 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a0000000000000500000000000000950000000b000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:56 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000507000000000000000068000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:56 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000001500000000", 0x32) 07:51:56 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x60000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:56 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:56 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x14, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) 07:51:56 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a0000000000000500000000000000950000000c000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:56 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000001600000000", 0x32) [ 2194.688069][ T1342] device macvlan0 entered promiscuous mode [ 2194.696189][ T1342] device macvlan0 left promiscuous mode 07:51:56 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:56 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x65580000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:56 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="400000001000050700000000000000006c000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:56 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x4c, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) 07:51:56 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a0000000000000500000000000000950000000d000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:56 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000001700000000", 0x32) 07:51:56 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:56 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x60, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) 07:51:56 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x81000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) [ 2194.900667][ T1483] device macvlan0 entered promiscuous mode [ 2194.919869][ T1483] device macvlan0 left promiscuous mode 07:51:57 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a0000000000000500000000000000950000000e000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:57 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000001800000000", 0x32) 07:51:57 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000507000000000000000074000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:57 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:57 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x300, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) 07:51:57 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x81ffffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:57 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009500000010000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:57 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000001900000000", 0x32) 07:51:57 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:57 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x500, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) [ 2195.131004][ T1616] device macvlan0 entered promiscuous mode [ 2195.138176][ T1616] device macvlan0 left promiscuous mode 07:51:57 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x88470000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:57 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000507000000000000000374000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:57 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009500000011000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:57 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000001a00000000", 0x32) 07:51:57 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x600, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) 07:51:57 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="394a0f7c390cb429aba027ac14d54d6300000064232f6b7eb23f4fce334c9042b6d27fa16b115dceb4a0aaae6a06ec66f193bc712b38c48008ab7018efe0d161720c98fa1d03782adfee5ef046c63c7492a5d996fca4121f433753854208cb684d539d552d4cf711dd2f871be05dd0f2afd2f70dd2d9e27f5e34a88cd5af7d0e9bf75551d3e78d661cd0e4b69850ae0bb172e7d45192f0ff539af8ec51460983a165b7b55662a7fa3f6f313eaa3760aa2c505396bb59a055ee885973ba3d769377a387b966a8d5f88fe61a6ffb974de7500a9bd1735d802bf29f532575e583af79ad4c3dfb5c5c0033d961b0b71c992a9154d0a85dbf6b2e0bd133ad3ea512ca4cb2", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:57 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000001b00000000", 0x32) 07:51:57 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009500000012000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:57 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x88480000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) [ 2195.332451][ T1746] device macvlan0 entered promiscuous mode [ 2195.344882][ T1746] device macvlan0 left promiscuous mode 07:51:57 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x700, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) 07:51:57 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="394a0f7c390cb429aba027ac14d54d6300000064232f6b7eb23f4fce334c9042b6d27fa16b115dceb4a0aaae6a06ec66f193bc712b38c48008ab7018efe0d161720c98fa1d03782adfee5ef046c63c7492a5d996fca4121f433753854208cb684d539d552d4cf711dd2f871be05dd0f2afd2f70dd2d9e27f5e34a88cd5af7d0e9bf75551d3e78d661cd0e4b69850ae0bb172e7d45192f0ff539af8ec51460983a165b7b55662a7fa3f6f313eaa3760aa2c505396bb59a055ee885973ba3d769377a387b966a8d5f88fe61a6ffb974de7500a9bd1735d802bf29f532575e583af79ad4c3dfb5c5c0033d961b0b71c992a9154d0a85dbf6b2e0bd133ad3ea512ca4cb2", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:57 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000507000000000000000376000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:57 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009500000018000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:57 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000001c00000000", 0x32) 07:51:57 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x900, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) 07:51:57 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x88a8ffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:57 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:57 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a0000000000000500000000000000950000021a000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:57 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000001d00000000", 0x32) [ 2195.571977][ T1892] device macvlan0 entered promiscuous mode [ 2195.580205][ T1892] device macvlan0 left promiscuous mode 07:51:57 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0xf00, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) 07:51:57 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000507000000000000000078000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:57 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x9effffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:57 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:57 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009500000020000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:57 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000001e00000000", 0x32) 07:51:57 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x1400, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) 07:51:57 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0xba020000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:57 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009500000025000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 2195.783868][ T2031] device macvlan0 entered promiscuous mode [ 2195.792432][ T2031] device macvlan0 left promiscuous mode 07:51:57 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:57 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000001f00000000", 0x32) 07:51:57 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x1cfb, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) 07:51:57 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000507000000000000000079000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:58 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009500000040000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:58 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0xeaffffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:58 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000002000000000", 0x32) 07:51:58 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x4c00, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) 07:51:58 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="394a0f7c390cb429aba027ac14d54d6300000064232f6b7eb23f4fce334c9042b6d27fa16b115dceb4a0aaae6a06ec66f193bc712b38c48008ab7018efe0d161720c98fa1d03782adfee5ef046c63c7492a5d996fca4121f433753854208cb684d539d552d4cf711dd2f871be05dd0f2afd2f70dd2d9e27f5e34a88cd5af7d0e9bf75551d3e78d661cd0e4b69850ae0bb172e7d45192f0ff539af8ec51460983a165b7b55662a7fa3f6f313eaa3760aa2c505396bb59a055ee885973ba3d769377a387b966a8d5f88fe61a6ffb974de7500a9bd1735d802bf29f532575e583af79ad4c3dfb5c5c0033d961b0b71c992a9154d0a85dbf6b2e0bd133ad3ea512ca4cb2", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) [ 2196.013125][ T2163] device macvlan0 entered promiscuous mode [ 2196.020559][ T2163] device macvlan0 left promiscuous mode 07:51:58 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009500000048000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:58 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="400000001000050700000000000000007a000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:58 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0xefffffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:58 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x6000, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) 07:51:58 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000002100000000", 0x32) 07:51:58 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:58 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a0000000000000500000000000000950000004c000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:58 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0xf0ffffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:58 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000002200000000", 0x32) 07:51:58 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0xfb1c, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) 07:51:58 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="394a0f7c390cb429aba027ac14d54d6300000064232f6b7eb23f4fce334c9042b6d27fa16b115dceb4a0aaae6a06ec66f193bc712b38c48008ab7018efe0d161720c98fa1d03782adfee5ef046c63c7492a5d996fca4121f433753854208cb684d539d552d4cf711dd2f871be05dd0f2afd2f70dd2d9e27f5e34a88cd5af7d0e9bf75551d3e78d661cd0e4b69850ae0bb172e7d45192f0ff539af8ec51460983a165b7b55662a7fa3f6f313eaa3760aa2c505396bb59a055ee885973ba3d769377a387b966a8d5f88fe61a6ffb974de7500a9bd1735d802bf29f532575e583af79ad4c3dfb5c5c0033d961b0b71c992a9154d0a85dbf6b2e0bd133ad3ea512ca4cb2", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) [ 2196.228273][ T2292] device macvlan0 entered promiscuous mode [ 2196.239836][ T2292] device macvlan0 left promiscuous mode 07:51:58 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="400000001000050700000000000000017e000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:58 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009500000068000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:58 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x34000, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) 07:51:58 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000002300000000", 0x32) 07:51:58 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0xfeff0000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:58 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:58 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a0000000000000500000000000000950000006c000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:58 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000002400000000", 0x32) 07:51:58 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x400300, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) [ 2196.454353][ T2418] device macvlan0 entered promiscuous mode [ 2196.475817][ T2418] device macvlan0 left promiscuous mode [ 2196.549818][ T1402] ================================================================== [ 2196.557920][ T1402] BUG: KCSAN: data-race in __jbd2_journal_drop_transaction / start_this_handle [ 2196.566848][ T1402] [ 2196.569162][ T1402] write to 0xffff888103183878 of 8 bytes by task 1836 on cpu 0: [ 2196.576861][ T1402] start_this_handle+0xd37/0x1050 [ 2196.581872][ T1402] jbd2__journal_start+0x1fc/0x3f0 [ 2196.586967][ T1402] __ext4_journal_start_sb+0x159/0x310 [ 2196.592411][ T1402] ext4_unlink+0x1b5/0x3b0 [ 2196.596811][ T1402] vfs_unlink+0x257/0x450 [ 2196.601147][ T1402] do_unlinkat+0x278/0x540 [ 2196.605546][ T1402] __x64_sys_unlink+0x2c/0x30 [ 2196.610211][ T1402] do_syscall_64+0x44/0xd0 [ 2196.614621][ T1402] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2196.620503][ T1402] [ 2196.622813][ T1402] read to 0xffff888103183878 of 8 bytes by task 1402 on cpu 1: [ 2196.630338][ T1402] __jbd2_journal_drop_transaction+0x1f0/0x2f0 [ 2196.636590][ T1402] __jbd2_journal_remove_checkpoint+0x2d5/0x3a0 [ 2196.642820][ T1402] jbd2_journal_commit_transaction+0x23f1/0x3460 [ 2196.649139][ T1402] kjournald2+0x263/0x480 [ 2196.653460][ T1402] kthread+0x2c7/0x2e0 [ 2196.657515][ T1402] ret_from_fork+0x1f/0x30 [ 2196.661922][ T1402] [ 2196.664235][ T1402] value changed: 0x0000000000000000 -> 0xffff888135d6a600 [ 2196.671324][ T1402] [ 2196.673635][ T1402] Reported by Kernel Concurrency Sanitizer on: [ 2196.679776][ T1402] CPU: 1 PID: 1402 Comm: jbd2/sda1-8 Not tainted 5.16.0-rc4-syzkaller #0 [ 2196.688182][ T1402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 07:51:58 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000507000000000000000081000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:58 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:58 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0xfeffffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) [ 2196.698222][ T1402] ================================================================== 07:51:58 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009500000074000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:58 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000002500000000", 0x32) 07:51:58 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x1000000, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) 07:51:59 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="394a0f7c390cb429aba027ac14d54d6300000064232f6b7eb23f4fce334c9042b6d27fa16b115dceb4a0aaae6a06ec66f193bc712b38c48008ab7018efe0d161720c98fa1d03782adfee5ef046c63c7492a5d996fca4121f433753854208cb684d539d552d4cf711dd2f871be05dd0f2afd2f70dd2d9e27f5e34a88cd5af7d0e9bf75551d3e78d661cd0e4b69850ae0bb172e7d45192f0ff539af8ec51460983a165b7b55662a7fa3f6f313eaa3760aa2c505396bb59a055ee885973ba3d769377a387b966a8d5f88fe61a6ffb974de7500a9bd1735d802bf29f532575e583af79ad4c3dfb5c5c0033d961b0b71c992a9154d0a85dbf6b2e0bd133ad3ea512ca4cb2", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:59 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0xff0f0000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:59 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a0000000000000500000000000000950000007a000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 2196.938264][ T2543] device macvlan0 entered promiscuous mode [ 2196.946505][ T2543] device macvlan0 left promiscuous mode 07:51:59 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000002600000000", 0x32) 07:51:59 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="400000001000050700000000000000058f000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:59 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x2000000, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) 07:51:59 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="394a0f7c390cb429aba027ac14d54d6300000064232f6b7eb23f4fce334c9042b6d27fa16b115dceb4a0aaae6a06ec66f193bc712b38c48008ab7018efe0d161720c98fa1d03782adfee5ef046c63c7492a5d996fca4121f433753854208cb684d539d552d4cf711dd2f871be05dd0f2afd2f70dd2d9e27f5e34a88cd5af7d0e9bf75551d3e78d661cd0e4b69850ae0bb172e7d45192f0ff539af8ec51460983a165b7b55662a7fa3f6f313eaa3760aa2c505396bb59a055ee885973ba3d769377a387b966a8d5f88fe61a6ffb974de7500a9bd1735d802bf29f532575e583af79ad4c3dfb5c5c0033d961b0b71c992a9154d0a85dbf6b2e0bd133ad3ea512ca4cb2", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:59 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a000000000000050000000000000095ffffff80000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:59 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0xffff0000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:59 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000002700000000", 0x32) 07:51:59 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x3000000, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) [ 2197.134229][ T2669] device macvlan0 entered promiscuous mode [ 2197.143518][ T2669] device macvlan0 left promiscuous mode 07:51:59 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:59 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a000000000000050000000000000095ffffff85000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:59 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000507000000000000000298000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:59 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0xffffa888, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:59 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000002800000000", 0x32) 07:51:59 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x4000000, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) 07:51:59 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a0000000000000500000000000000950000008a000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:59 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x0, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:59 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000002900000000", 0x32) 07:51:59 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0xffffff7f, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) [ 2197.348017][ T2792] device macvlan0 entered promiscuous mode [ 2197.355378][ T2792] device macvlan0 left promiscuous mode 07:51:59 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x5000000, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) 07:51:59 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="400000001000050700000000000000059d000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:59 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a000000000000050000000000000095ffffff90000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:59 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x0, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:59 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000002a00000000", 0x32) 07:51:59 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x6000000, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) 07:51:59 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0xffffff81, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:59 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a000000000000050000000000000095000003bc000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 2197.558334][ T2916] device macvlan0 entered promiscuous mode [ 2197.568892][ T2916] device macvlan0 left promiscuous mode 07:51:59 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="40000000100005070000000000000000a5000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:59 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x0, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:59 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x7000000, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) 07:51:59 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000002b00000000", 0x32) 07:51:59 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:59 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a000000000000050000000000000095000001e5000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:59 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, 0x0) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:59 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x8000000, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) 07:51:59 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000002c00000000", 0x32) [ 2197.747776][ T3037] device macvlan0 entered promiscuous mode [ 2197.755007][ T3037] device macvlan0 left promiscuous mode 07:51:59 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="40000000100005070000000000000000a6000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:51:59 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0xffffffea, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:51:59 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a000000000000050000000000000095001ed6e6000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:51:59 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, 0x0) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:51:59 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x9000000, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) 07:51:59 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000002d00000000", 0x32) [ 2197.948171][ T3161] device macvlan0 entered promiscuous mode [ 2197.955884][ T3161] device macvlan0 left promiscuous mode 07:52:00 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0xffffffef, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:52:00 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a000000000000050000000000000095000000ff000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:52:00 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0xf000000, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) 07:52:00 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000002e00000000", 0x32) 07:52:00 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="40000000100005070000000000000002a8000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:52:00 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, 0x0) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="394a0f7c390cb429aba027ac14d54d6300000064232f6b7eb23f4fce334c9042b6d27fa16b115dceb4a0aaae6a06ec66f193bc712b38c48008ab7018efe0d161720c98fa1d03782adfee5ef046c63c7492a5d996fca4121f433753854208cb684d539d552d4cf711dd2f871be05dd0f2afd2f70dd2d9e27f5e34a88cd5af7d0e9bf75551d3e78d661cd0e4b69850ae0bb172e7d45192f0ff539af8ec51460983a165b7b55662a7fa3f6f313eaa3760aa2c505396bb59a055ee885973ba3d769377a387b966a8d5f88fe61a6ffb974de7500a9bd1735d802bf29f532575e583af79ad4c3dfb5c5c0033d961b0b71c992a9154d0a85dbf6b2e0bd133ad3ea512ca4cb2", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:52:00 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a000000000000050000000000000095000060ff000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:52:00 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0xfffffff0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:52:00 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x14000000, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) 07:52:00 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000002f00000000", 0x32) 07:52:00 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) [ 2198.182983][ T3292] device macvlan0 entered promiscuous mode [ 2198.194653][ T3292] device macvlan0 left promiscuous mode 07:52:00 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009580ffffff000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:52:00 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="40000000100005070000000000000003a8000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:52:00 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0xfffffffe, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:52:00 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x4c000000, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) 07:52:00 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000003000000000", 0x32) 07:52:00 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:52:00 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009585ffffff000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:52:00 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x60000000, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) 07:52:00 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000003100000000", 0x32) 07:52:00 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:52:00 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) [ 2198.388745][ T3426] device macvlan0 entered promiscuous mode [ 2198.396780][ T3426] device macvlan0 left promiscuous mode 07:52:00 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009590ffffff000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:52:00 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="40000000100005070000000000000000b0000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:52:00 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000006000000000", 0x32) 07:52:00 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:52:00 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x9effffff, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) 07:52:00 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a000000000000050000000000000095ffffffffff6000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:52:00 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x0, 0x2, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) [ 2198.598819][ T3551] device macvlan0 entered promiscuous mode [ 2198.608378][ T3551] device macvlan0 left promiscuous mode 07:52:00 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000586500000000", 0x32) 07:52:00 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="40000000100005070000000000000005c2000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:52:00 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:52:00 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0xefffffff, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) 07:52:00 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009500000000000020"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:52:00 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) [ 2198.686154][ T3598] validate_nla: 97 callbacks suppressed [ 2198.686169][ T3598] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 2198.699893][ T3598] netlink: 'syz-executor.0': attribute type 6 has an invalid length. [ 2198.711819][ T3659] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 07:52:00 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000336c00000000", 0x32) 07:52:00 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:52:00 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:52:00 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0xf0ffffff, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) 07:52:00 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) [ 2198.841056][ T3673] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 2198.849172][ T3673] netlink: 'syz-executor.0': attribute type 6 has an invalid length. [ 2198.861324][ T3674] device macvlan0 entered promiscuous mode [ 2198.868361][ T3674] device macvlan0 left promiscuous mode [ 2198.869440][ T3676] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 07:52:01 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="40000000100005070000000000000005c3000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:52:01 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000007c00000000", 0x32) 07:52:01 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:52:01 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:52:01 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0xf5ffffff, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) 07:52:01 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x0, 0x5, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) [ 2199.008401][ T3790] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 2199.016546][ T3790] netlink: 'syz-executor.0': attribute type 6 has an invalid length. [ 2199.035351][ T3791] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 07:52:01 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:52:01 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000008100000000", 0x32) 07:52:01 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) [ 2199.136261][ T3800] device macvlan0 entered promiscuous mode [ 2199.144364][ T3800] device macvlan0 left promiscuous mode 07:52:01 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0xfb1c0000, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) 07:52:01 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="40000000100005070000000000000003cc000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:52:01 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x0, 0x6, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) [ 2199.186798][ T3807] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 07:52:01 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:52:01 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:52:01 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00000000ffffff8100000000", 0x32) 07:52:01 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0xffffff7f, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) 07:52:01 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x0, 0x7, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) [ 2199.338979][ T3925] device macvlan0 entered promiscuous mode [ 2199.347151][ T3925] device macvlan0 left promiscuous mode 07:52:01 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000478800000000", 0x32) 07:52:01 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:52:01 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="40000000100005070000000000000005d6000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:52:01 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r4, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r4, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r4, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r4, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r4, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:52:01 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0xffffff9e, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) 07:52:01 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x0, 0x8, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:52:01 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000488800000000", 0x32) 07:52:01 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:52:01 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write(0xffffffffffffffff, &(0x7f0000001940), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r4, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r4, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x44, r4, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_SECRET={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="394a0f7c390cb429aba027ac14d54d6300000064232f6b7eb23f4fce334c9042b6d27fa16b115dceb4a0aaae6a06ec66f193bc712b38c48008ab7018efe0d161720c98fa1d03782adfee5ef046c63c7492a5d996fca4121f433753854208cb684d539d552d4cf711dd2f871be05dd0f2afd2f70dd2d9e27f5e34a88cd5af7d0e9bf75551d3e78d661cd0e4b69850ae0bb172e7d45192f0ff539af8ec51460983a165b7b55662a7fa3f6f313eaa3760aa2c505396bb59a055ee885973ba3d769377a387b966a8d5f88fe61a6ffb974de7500a9bd1735d802bf29f532575e583af79ad4c3dfb5c5c0033d961b0b71c992a9154d0a85dbf6b2e0bd133ad3ea512ca4cb2", @ANYRES16=r4, @ANYBLOB="00042bbd7000fddbdf25040000000800060081000000080005000100000008000300001000000800020005000000080002003e7200000800050005000000080006000400000008000500020000000800030008000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r4, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 07:52:01 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0xffffffef, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) [ 2199.549253][ T4056] device macvlan0 entered promiscuous mode [ 2199.559175][ T4056] device macvlan0 left promiscuous mode 07:52:01 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) r0 = socket(0x0, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x64, 0x10, 0x403, 0x0, 0x9, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x40408c4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)) 07:52:01 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="40000000100005070000000000000054d9000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) 07:52:01 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000000000000000078ab49070000b70a00000000000005000000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 07:52:01 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00000000ffffa88800000000", 0x32) 07:52:01 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0xfffffff0, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x5, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x60}}, 0x0) 07:52:01 executing program 0: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x41) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ea54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0,