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", 0x2000, &(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={0x18, 0xfffffffffffffffe}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) read$FUSE(r2, 0x0, 0x0) [ 877.957432] syz_tun: This device is already a HSR slave. 13:09:46 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0xa}, @IFLA_HSR_MULTICAST_SPEC={0x5}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:09:46 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000200), &(0x7f00000002c0)=0x90) [ 878.231932] audit: type=1800 audit(1674565786.433:11038): pid=31003 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16264 res=0 [ 878.298834] syz_tun: This device is already a HSR slave. 13:09:46 executing program 1: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @remote, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @private=0xa010102, @local}, @dest_unreach={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty=0x30f, {[@timestamp_prespec={0x44, 0x34, 0x0, 0x3, 0x0, [{@initdev={0xac, 0x1e, 0x0, 0x0}}, {@dev}, {@remote}, {@empty}, {}, {@private}]}, @rr={0x7, 0xb, 0x0, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}}}, 0x0) 13:09:46 executing program 0: epoll_create1(0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x0, 0x0) read$char_usb(r0, &(0x7f0000001980)=""/179, 0xb3) 13:09:46 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0xf7, 0x80, 0x7f, 0x4, 0x0, 0x5, 0x2006, 0x9, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000000), 0x6}, 0x10000, 0x1, 0xc56c, 0x2, 0x800, 0xb83, 0x3, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, r0, 0x3) 13:09:46 executing program 3: r0 = epoll_create1(0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0xe000001a}) read$char_usb(r1, &(0x7f0000001980)=""/179, 0xb3) epoll_pwait(r0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) 13:09:46 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=@ipv4_newaddr={0x18}, 0x18}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x67) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000300)=@newqdisc={0x34, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_pfifo_fast={0xf}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000900)=@newqdisc={0x48, 0x24, 0xd15, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xfff1, 0xffff}}, [@TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}]}, 0x48}}, 0x0) 13:09:46 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0xb}, @IFLA_HSR_MULTICAST_SPEC={0x5}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:09:47 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) syz_mount_image$f2fs(&(0x7f0000010600), &(0x7f0000010640)='./file0\x00', 0x0, &(0x7f0000001180)=ANY=[@ANYBLOB="00688f72cd80fa67951235f72c3a160df05e0c1dcf6b2b67c26463c22eaaf65f3dd14842becd7fa09495497a9e50c7ace9ae30955ca8688e50a333616508670d3c0c4709064cc6cf046f142f2fd75ed8bc97775cb1b3566242aab82e4e4035782103267f00372e00"/115], 0x1, 0x105df, &(0x7f00000106c0)="$eJzs3L9vG+UfB/CPm29/fkuJUH8wgDgJISUStuIkrWBBAVoBUlNFFAYmcOyL5db2RbGTmC4sMCAxsfBPMMHfwAI7KyxsLCCxVYB8d0ENdADixqV5vaTL+7nHz338PJaXxxddAEfWbPLLz5U4F6cjYiYizkbk7Up55FaKeDIinomIY/cclbL/j44TEXEmIs6Nixc1K+VLT/169/svvrn+9MffffrtB5/9dHN6qwam7bmI6G0W7d1ekVm7yFtlf2Onk2dveafM4oXe7fI8K3I3Xc8r7Db2xjXyXGoX47PN7cE4N7qN5jjbnY28f7NfvOFgp71XJ7/gVmMrP2+l63l2Blme7TvFvEZl3hkMizqtst77efkYDvey6E9HabGezdt5NvvDsr+om7XS0Th3yizfLppZt5XPY/1ff8wPveud/vYo2Um3Bp2sn1yu1V+o1a9U61tZKx2my9VGr3VlOZlrd8fDqsO00VtpZ1m7m9aaWW8+mWs3m9V6PZm7mq53Gv2kXq8t1Raql+fL1vPJazfeTrqtZG6cr3T628NOd5BsZFtJccV8slhbenE+ebae3FxdS9bevHZtde2td6++c+Pl1TdeLQf9ZVrJ3OLC4mK1vlBdrM9b/0GMKge7niPO9wfgH7P/B6bB/t/+P+x/j/z67f85EN8fAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIAj64fjX76eN2aL8/+X/Y+VXU9ExKWIuBgRFyLit/uYiRP7ap6PiErZvt/443+aw1eVyCuMrzlZHmciYqU87j7+oD8FAAAAeHR9/vWHH0XMjJv5n5emPSEOU/mjzalJ1ct/8vnfpKqdz4uNJlTtwl7JibgYEcdnf5xQtUsRcezsexOq9rfM7ItT90SliGOHORsAAOBw7N8JTGz3BgAAwEPnk2lPgOnI79eW/4tf3gs+WUR5Q/D0vjMAAADgP6gy7QkAAAAAD1y+//f8PwAAAHi0Fc//AwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACA39m5m9vEgSgO4A9YL+yXFq34aIXTao8cKGJLyDEFJN3kRg2REHWQW0qIIMKeSHHEIZLHOEG/n2RmbMFfz9yexxoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgTQ/Fenm3vbltmrM/NJPnbgAAAIBTdsV6WU7G1fmPdP1XuvQnIuYRMYuIaUSc6t0H8bWWOYmIXpqf+n7xpob7iDLh+JthOr5HxL90PP1u+18AAACAy7XdLFYRg+O0/PjbdUGcU3poM8qVVz7y+ZIrbVKGXWdKm75EZjGLiGL8mCltHhH9n/8zpb3LoDaMXg29auifsxoAAOA86p1Atu4NAACAD+eq6wLoRrlem97FT2vBw2pIC4LfamcAAADAJ9TrugAAAACgdWX/b/8/AAAAuGzV/n8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC0aVesl9vNYtU0Z39oJs/dAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPDM/ryjQAiEQRjsXd93Grz/saRBU1OTKhA+/sZgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIA3v/vL/4mpcSaZe20sPY8ka6fG1qmxd24c/WF8/RoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOBif+5OIASCIAz2nf85LeYfljRoDCJUwcLHDPOwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAF/0u1/+T0yNM8ncaWPpeCRZu2psXTX2HjSOHoy3fwMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAXO3AgAAAAAADk/9oIVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVdiBAwEAAAAAIP/XRqiqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqrCDhwIAAAAAAD5vzZCVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVFXbgQAAAAAAAyP+1EaqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqwAwcCAAAAAED+r41QVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVhR04EAAAAAAA8n9thKqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqirswIEAAAAAAJD/ayNUVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVYQcOBAAAAACA/F8boaqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqgo7cCAAAAAAAOT/2ghVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVV2J9724SBMI7Dry+JErfJCOmtBGagoUIwAh8SkiXPwAAsRENFa7EIrAASnGs6U/A8zf9XXHEvAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8JouD1+8RUQRqcsUabz5Ob1HxEekbduOPm9Z7M7H5uues/1hkvM7pr9lRJRR9HEOAEDvqm5zrNb18i/vf95B3mHeat7Ui2d+GgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4MrO/bxE8cZxAH92dff7tVuXDlFQFiRErT8QV/FSFFjQP+Bt0U2ktUQ9pARhF+kSdOnepUvdPHXqP+jUJaKg7hsURBCEsbsz9pga62VnpdcLnpmPwzDzPHMQ3vMZBQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOpL4ezqd1LoRwvPd33fD2y72Zvfb1+8dG0/Ho5PPF+JqNSxRCCDfna9XBDq6lm50Nw839h88PB+Jn+Od5y6trtyq1WnVJoVAotosMfmkBAHBoFZLRyPUfC5tTjWO5yRC2nu7M/+eiOrSZ/7eeDLyO7xXn/6GOrbC7pfl/+vrGxN/yf2llYbG0vLp2YX6hMledq94eGhsfGxwpjw6PlZrvU0reqgAAALC/YjLi/J+f3N3/PxLVoc38/+rlten4Xj3y/y5p/r/c3/+svf5/BpMEAAD4Rxw99e1rbo/juWIx3K2srCwNtbbbPw+3thlM9cD+S0ac/3sms54VAAAA0An19dyO/v9sVIc2+//vv185EV+zJ4TQl/T/L87cqc12bjldK+3/T1yq3Mj67/8zWD4AAAAd0peMuP9faH7/nz+dnpMPIQycadXJvwFsK///fDD+Jr5X/P3/SOeW2JXy5dbzSPP/xrsX8/vl/+a55RB6yxlNFgAAgEPv/2Q08v+nwubU0o/HV4u+/wcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD4xY4dozQTRHEAn2ST72sUA4JYWmhjISoIVgELQeIhLERB8AgB8QAKnsXCO4ikTkoPkMIbyEx2JGyjguxq+P1g8n+ETfbtTJMXAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgE9Nj8JGrov40pvV7fK98dvwPOakkumzN2sHccW6VW/bf856mc+T06fx3B62DpvrCQAAgMVT5Pk+hPDafTyJ2e6n+X8rXxNn/uHyrM7zfHXuz5ln/7iWHoqzjxv1ZvfphhAur64vdmt7wt9tM+ynHLxs38/vYfW6lS98VyedT/qHpkjH1h7crk67addbd6PR8b9U/v/5pwAAvmsnZ1nk30cx95psDICF1SlXmJv/i36zPQEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADU4T0AAP//XHWQwg==") r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) epoll_create1(0x80000) r2 = accept$packet(r1, 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) r4 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) sendfile(r3, r4, 0x0, 0x1000000201005) sendfile(r0, r1, 0x0, 0x80001d00c0d0) 13:09:47 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0xf7, 0x80, 0x7f, 0x4, 0x0, 0x5, 0x2006, 0x9, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000000), 0x6}, 0x10000, 0x1, 0xc56c, 0x2, 0x800, 0xb83, 0x3, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, r0, 0x3) 13:09:47 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) dup3(r2, r0, 0x0) [ 878.784404] syz_tun: This device is already a HSR slave. [ 878.843288] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 13:09:47 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0xf}, @IFLA_HSR_MULTICAST_SPEC={0x5}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:09:47 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'pim6reg1\x00', 0x2}) ioctl$TUNGETFILTER(r0, 0x401054d6, 0x0) 13:09:47 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0xf7, 0x80, 0x7f, 0x4, 0x0, 0x5, 0x2006, 0x9, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000000), 0x6}, 0x10000, 0x1, 0xc56c, 0x2, 0x800, 0xb83, 0x3, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, r0, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0xf7, 0x80, 0x7f, 0x4, 0x0, 0x5, 0x2006, 0x9, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000000), 0x6}, 0x10000, 0x1, 0xc56c, 0x2, 0x800, 0xb83, 0x3, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, r0, 0x3) (async) 13:09:47 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @remote, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x5, 0x0, 0x0, 0x2, 0x0, 0xe000, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback=0xac1414aa, @local}}}}}}, 0x0) 13:09:47 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="70000000081409"], 0x70}}, 0x0) 13:09:47 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x70240, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x462001, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000100)={'\x00', 0x2d6, 0x3, 0x9}) fstat(r0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) perf_event_open(0x0, r2, 0x10000007, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) preadv(r3, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r3, 0xd000941e, &(0x7f0000001600)={0x0, "48006cf0a81704e3c7c90110455edcd5"}) perf_event_open(&(0x7f0000000100)={0x7, 0x80, 0x5a, 0x5, 0x2, 0x1, 0x0, 0x7, 0x40248, 0x9, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0x0, 0x5}, 0x201, 0x0, 0x8, 0x7, 0x7, 0x8, 0x101, 0x0, 0x80, 0x0, 0x400}, r2, 0x3, r3, 0x8) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x1, 0x6, 0x4, 0x0, 0x5, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000200), 0xe}, 0x8000, 0x6, 0x5, 0x8, 0x0, 0x5, 0x2838, 0x0, 0x3, 0x0, 0x9}, r2, 0xc, 0xffffffffffffffff, 0x1) [ 879.338553] syz_tun: This device is already a HSR slave. 13:09:47 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x0, 0x0, 0x0, 0x0, 0x14, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x48) 13:09:47 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$MRT_DONE(r0, 0x6, 0x6c6, 0x20000000, 0x10) 13:09:47 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x10}, @IFLA_HSR_MULTICAST_SPEC={0x5}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) [ 879.627616] audit: type=1800 audit(1674565787.823:11039): pid=31040 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=16264 res=0 13:09:48 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_GET(r0, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000001600)={0x20, 0x1402, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x4, 0x300}]}, 0x20}}, 0x0) 13:09:48 executing program 2: r0 = timerfd_create(0x0, 0x0) ioctl$TFD_IOC_SET_TICKS(r0, 0x5452, &(0x7f0000000140)=0x4) [ 879.754068] audit: type=1804 audit(1674565787.863:11040): pid=31040 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir3650541827/syzkaller.1xavNU/2297/bus" dev="sda1" ino=16264 res=1 13:09:48 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x70240, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x462001, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000100)={'\x00', 0x2d6, 0x3, 0x9}) fstat(r0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) perf_event_open(0x0, r2, 0x10000007, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) preadv(r3, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r3, 0xd000941e, &(0x7f0000001600)={0x0, "48006cf0a81704e3c7c90110455edcd5"}) perf_event_open(&(0x7f0000000100)={0x7, 0x80, 0x5a, 0x5, 0x2, 0x1, 0x0, 0x7, 0x40248, 0x9, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0x0, 0x5}, 0x201, 0x0, 0x8, 0x7, 0x7, 0x8, 0x101, 0x0, 0x80, 0x0, 0x400}, r2, 0x3, r3, 0x8) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x1, 0x6, 0x4, 0x0, 0x5, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000200), 0xe}, 0x8000, 0x6, 0x5, 0x8, 0x0, 0x5, 0x2838, 0x0, 0x3, 0x0, 0x9}, r2, 0xc, 0xffffffffffffffff, 0x1) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x70240, 0x0) (async) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x462001, 0x0) (async) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000100)={'\x00', 0x2d6, 0x3, 0x9}) (async) fstat(r0, &(0x7f0000000080)) (async) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ptrace(0x10, r2) (async) perf_event_open(0x0, r2, 0x10000007, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.current\x00', 0x275a, 0x0) (async) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[], 0x208e24b) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) (async) preadv(r3, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) (async) ioctl$BTRFS_IOC_DEV_INFO(r3, 0xd000941e, &(0x7f0000001600)={0x0, "48006cf0a81704e3c7c90110455edcd5"}) (async) perf_event_open(&(0x7f0000000100)={0x7, 0x80, 0x5a, 0x5, 0x2, 0x1, 0x0, 0x7, 0x40248, 0x9, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0x0, 0x5}, 0x201, 0x0, 0x8, 0x7, 0x7, 0x8, 0x101, 0x0, 0x80, 0x0, 0x400}, r2, 0x3, r3, 0x8) (async) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x1, 0x6, 0x4, 0x0, 0x5, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000200), 0xe}, 0x8000, 0x6, 0x5, 0x8, 0x0, 0x5, 0x2838, 0x0, 0x3, 0x0, 0x9}, r2, 0xc, 0xffffffffffffffff, 0x1) (async) 13:09:48 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8914, &(0x7f0000000000)={'ip6_vti0\x00', 0x0}) 13:09:48 executing program 1: unshare(0xc000480) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000000)=0x100, 0x4) [ 879.910992] syz_tun: This device is already a HSR slave. 13:09:48 executing program 2: getrandom(&(0x7f0000000000)=""/21, 0xfffffffffffffe12, 0x0) 13:09:48 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="70000000061409"], 0x70}}, 0x0) 13:09:48 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x14}, @IFLA_HSR_MULTICAST_SPEC={0x5}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:09:48 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc0189436, &(0x7f0000001880)={{0x1, 0x1, 0x18}, './file1\x00'}) 13:09:48 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='vegas\x00', 0x6) 13:09:48 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x70240, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x462001, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000100)={'\x00', 0x2d6, 0x3, 0x9}) fstat(r0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) (async, rerun: 64) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (rerun: 64) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) perf_event_open(0x0, r2, 0x10000007, 0xffffffffffffffff, 0x0) (async, rerun: 64) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.current\x00', 0x275a, 0x0) (rerun: 64) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) (async, rerun: 32) preadv(r3, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) (async, rerun: 32) ioctl$BTRFS_IOC_DEV_INFO(r3, 0xd000941e, &(0x7f0000001600)={0x0, "48006cf0a81704e3c7c90110455edcd5"}) (async, rerun: 32) perf_event_open(&(0x7f0000000100)={0x7, 0x80, 0x5a, 0x5, 0x2, 0x1, 0x0, 0x7, 0x40248, 0x9, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0x0, 0x5}, 0x201, 0x0, 0x8, 0x7, 0x7, 0x8, 0x101, 0x0, 0x80, 0x0, 0x400}, r2, 0x3, r3, 0x8) (rerun: 32) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x1, 0x6, 0x4, 0x0, 0x5, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000200), 0xe}, 0x8000, 0x6, 0x5, 0x8, 0x0, 0x5, 0x2838, 0x0, 0x3, 0x0, 0x9}, r2, 0xc, 0xffffffffffffffff, 0x1) 13:09:48 executing program 1: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="400000000a140779c76968d514a7df25080003000300000008000300000000000800150005000000080001"], 0x40}}, 0x0) 13:09:48 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) 13:09:48 executing program 0: unshare(0x400) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140), 0x10) 13:09:48 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001e80)={0x0, 0x0, 0x0, &(0x7f0000000dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:09:48 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="70000000111409"], 0x70}}, 0x0) 13:09:48 executing program 1: unshare(0x400) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) [ 880.783961] syz_tun: This device is already a HSR slave. 13:09:49 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001e80)={0x11, 0x3, &(0x7f0000000d80)=@framed, &(0x7f0000000dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:09:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x2, 0x6, 0x1, 0x5, 0x0, 0x4, 0x8000, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000000), 0xc}, 0x8, 0x7, 0xff, 0x4, 0x5, 0x6, 0x3, 0x0, 0x8, 0x0, 0xb7}, 0x0, 0xffffffffffffffff, r0, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000000c0)=0x5) 13:09:49 executing program 0: unshare(0xc000480) r0 = timerfd_create(0x0, 0x0) ioctl$TFD_IOC_SET_TICKS(r0, 0x40085400, &(0x7f0000000140)) 13:09:49 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x33}, @IFLA_HSR_MULTICAST_SPEC={0x5}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:09:49 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14}, 0x53fe0}}, 0x53fcc) 13:09:49 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000040001f0000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0xe6, &(0x7f0000000100)=""/230, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:09:49 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000900)=@bpf_tracing={0x1a, 0x1, &(0x7f00000006c0)=@raw=[@generic], &(0x7f0000000740)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:09:49 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000140)) 13:09:49 executing program 3: unshare(0x28060680) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x11, &(0x7f0000000080), 0x4) 13:09:49 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0x40049409, &(0x7f0000001880)={{0x1, 0x1, 0x18}, './file1\x00'}) 13:09:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x2, 0x6, 0x1, 0x5, 0x0, 0x4, 0x8000, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000000), 0xc}, 0x8, 0x7, 0xff, 0x4, 0x5, 0x6, 0x3, 0x0, 0x8, 0x0, 0xb7}, 0x0, 0xffffffffffffffff, r0, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000000c0)=0x5) [ 881.212897] syz_tun: This device is already a HSR slave. 13:09:49 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x34}, @IFLA_HSR_MULTICAST_SPEC={0x5}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:09:49 executing program 0: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180)={0x8000000000000000}, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)={&(0x7f0000000240)={[0x100000000]}, 0x8}) 13:09:49 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000900)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:09:49 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_DELLINK(r0, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x10}, 0xd00}}, 0x0) 13:09:49 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x2) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x48}}, 0x0) connect$netlink(r0, &(0x7f0000000040)=@proc={0x10, 0x0, 0x0, 0x4000000}, 0xc) 13:09:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x2, 0x6, 0x1, 0x5, 0x0, 0x4, 0x8000, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000000), 0xc}, 0x8, 0x7, 0xff, 0x4, 0x5, 0x6, 0x3, 0x0, 0x8, 0x0, 0xb7}, 0x0, 0xffffffffffffffff, r0, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000000c0)=0x5) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x2, 0x6, 0x1, 0x5, 0x0, 0x4, 0x8000, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000000), 0xc}, 0x8, 0x7, 0xff, 0x4, 0x5, 0x6, 0x3, 0x0, 0x8, 0x0, 0xb7}, 0x0, 0xffffffffffffffff, r0, 0x2) (async) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000000c0)=0x5) (async) 13:09:49 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x6, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst]}, &(0x7f00000000c0)='syzkaller\x00', 0x5, 0x1000, &(0x7f00000018c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 881.500170] syz_tun: This device is already a HSR slave. 13:09:49 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="0e00000009000d00ffff000008000b008000000008000b0008000000060005003f060014060005002207000008000b00ffff000007000100667700006c0002001400030076657468300000000000000000000000140003006261746164765f736c6176655f3100001400030076657468305f766972745f77696669001400030070696d367265673100000000000000000800010002119371e63d351c42fc8a000700080001000500050008000500ffffff7f648150c4ceaa7dd1a0d0d475cf2ad4f3edd8ad2f40680663047205957135710a8568f4f2be375119aba03c6339236c72fcc387fa25a49b2caad6c4362b117c0cb1ab62d1266265173d5e81529e3038840fb985a64a3fc2e74e1c03b7168b9efdb16c2780d254b05444bb2e701aabbc2bf3e9f4ea99dc25aaa1b6b6593e8878ae7525beafd4a0b4fb32180c485a17dc8ba9409d4bece6d7f8512d9b996a912da234cace74de11499d7abe9606"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x3c}, @IFLA_HSR_MULTICAST_SPEC={0x5}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:09:49 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x0, 0x0, 0x0, 0x0, 0x14}, 0x48) 13:09:49 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001e80)={0x0, 0x3, &(0x7f0000000d80)=@framed, &(0x7f0000000dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:09:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x14, 0x0, 0x24}, 0x14}}, 0x0) 13:09:49 executing program 5: read$usbmon(0xffffffffffffffff, &(0x7f0000000000)=""/137, 0x89) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:09:49 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000000)=0xc64, 0x4) 13:09:49 executing program 3: unshare(0xc000480) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x894c, 0x0) 13:09:49 executing program 1: pselect6(0x40, &(0x7f0000001180), 0x0, &(0x7f0000001200)={0x100000000}, 0x0, &(0x7f00000012c0)={&(0x7f0000001280), 0x8}) 13:09:49 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000040007a0000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0xe6, &(0x7f0000000100)=""/230, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:09:49 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8914, &(0x7f0000000000)={'ip6tnl0\x00', 0x0}) [ 881.759910] syz_tun: This device is already a HSR slave. 13:09:50 executing program 5: read$usbmon(0xffffffffffffffff, &(0x7f0000000000)=""/137, 0x89) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:09:50 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x44}, @IFLA_HSR_MULTICAST_SPEC={0x5}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:09:50 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x2) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000012c0)={&(0x7f00000011c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000001280)={&(0x7f0000001240)={0x10}, 0x10}}, 0x0) 13:09:50 executing program 1: bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000980), 0x10) 13:09:50 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000100), 0x0, &(0x7f0000000180)={0x1, 0x0, @d}, 0x18, 0xffffffffffffffff) 13:09:50 executing program 5: read$usbmon(0xffffffffffffffff, &(0x7f0000000000)=""/137, 0x89) (async) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:09:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xf) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x10}, 0x10}}, 0x0) 13:09:50 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$MRT_DONE(r0, 0x6, 0xd, 0x0, 0x4) 13:09:50 executing program 2: unshare(0x28060680) unshare(0x4040000) 13:09:50 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = fcntl$dupfd(r0, 0x406, r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='\x00') ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000000)=0x20) 13:09:50 executing program 1: keyctl$clear(0xe, 0xfffffffffffffffb) 13:09:50 executing program 0: pselect6(0x40, &(0x7f0000000140), 0x0, &(0x7f00000001c0)={0x5}, 0x0, 0x0) 13:09:50 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$revoke(0x3, r0) keyctl$restrict_keyring(0x1d, r0, 0x0, 0x0) 13:09:50 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x2}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:09:50 executing program 2: keyctl$search(0xa, 0x0, &(0x7f0000000080)='rxrpc_s\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0) 13:09:50 executing program 1: unshare(0x400) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) 13:09:50 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r2 = fcntl$dupfd(r0, 0x406, r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='\x00') (async) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000000)=0x20) 13:09:50 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0x40049409, 0x0) [ 882.563706] syz_tun: This device is already a HSR slave. 13:09:50 executing program 1: getrandom(&(0x7f0000000000)=""/21, 0xfffffffffffffe12, 0x0) bpf$MAP_CREATE(0x18, &(0x7f0000000000)=@bloom_filter, 0x94) 13:09:50 executing program 3: syz_open_dev$loop(&(0x7f0000000180), 0xfffffffffffffffb, 0x2420c0) 13:09:50 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r2 = fcntl$dupfd(r0, 0x406, r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='\x00') (async) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000000)=0x20) 13:09:50 executing program 2: write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001e80)={0x11, 0x3, &(0x7f0000000d80)=@framed, &(0x7f0000000dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 882.743681] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.4'. [ 882.763337] (unnamed net_device) (uninitialized): HSR: Slave1 device not specified 13:09:51 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x3}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) [ 882.943644] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.4'. [ 882.960650] (unnamed net_device) (uninitialized): HSR: Slave1 device not specified 13:09:51 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_CM_ID_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x7, 0x5}, 0x10}}, 0x0) 13:09:51 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000380), r0) 13:09:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000680)={0x1, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80045, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NFULNL_MSG_CONFIG(r1, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000000)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x84) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r2, &(0x7f0000000640)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000005c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES64=r2, @ANYRES16=r1, @ANYRES32=0x0, @ANYRESDEC=r0, @ANYRES32, @ANYRES8, @ANYRES32=0x0, @ANYBLOB="080001000200000008001d00", @ANYRES32=r1, @ANYBLOB="730fca408a8504c01583f282a224df7e8448de241ebd0767d4162695e524f2d817b92adc1736696e2994cc4b39af3c40bbdfcc720e0adb074d14e46811eeec8c6616bae6659f742234693cf48e7067f773c59291ffffffffffffffff57552a5c8d53247f10a865eeb3d0a3fae23aef42ec4f6b0c01916b55dfbd3cf600000000"], 0x64}, 0x1, 0x0, 0x0, 0x4090}, 0x4004) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) preadv(r3, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r3, 0xd000941e, &(0x7f0000001600)={0x0, "4800dcd500"}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r3) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000100)={0x4, 0x80, 0xff, 0x2, 0x7, 0x7, 0x0, 0x3, 0x41, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x6, 0x4, @perf_config_ext={0x9, 0x7}, 0x4, 0x49c5f8e7, 0x6, 0x7, 0x80, 0x80, 0x401, 0x0, 0x6, 0x0, 0x1}) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x73, 0x9, 0x9, 0x0, 0x3, 0xc000, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x0, 0x2}, 0x80000, 0x2, 0x2, 0x7, 0x1, 0x3, 0x4, 0x0, 0x80, 0x0, 0x9}, r4, 0x0, 0xffffffffffffffff, 0x1) 13:09:51 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="700000000f14090027bdec080000000009004500756d61640000000008005d"], 0x70}}, 0x0) 13:09:51 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x6}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:09:51 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'ip6gre0\x00', 0x0, 0x2f, 0x60, 0x5, 0x4, 0x3a, @private2, @remote, 0x7800, 0x8100, 0xc1, 0x7}}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl2\x00', 0x0, 0x4, 0xca, 0x5, 0x903, 0x50, @local, @remote, 0x20, 0x20, 0x1, 0x2}}) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000240)={'vxcan1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000340)={'ip6_vti0\x00', &(0x7f0000000280)={'ip6tnl0\x00', r3, 0x29, 0x5, 0x0, 0x1ff, 0x34, @initdev={0xfe, 0x88, '\x00', 0x4, 0x0}, @empty, 0x10, 0x80, 0x8, 0x400}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000002c0)={'ip6tnl0\x00', &(0x7f0000000240)={'syztnl0\x00', r3, 0x4, 0x3, 0x2, 0xfff, 0x42, @empty, @mcast1, 0x1, 0x7800, 0x80, 0xdb}}) sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)={0x84, 0x0, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x7, 0x34}}}}, [@NL80211_ATTR_STA_FLAGS2={0xc, 0x43, {0xd1d, 0x200}}, @NL80211_ATTR_STA_WME={0x44, 0x81, [@NL80211_STA_WME_UAPSD_QUEUES={0x5, 0x1, 0x1}, @NL80211_STA_WME_UAPSD_QUEUES={0x5, 0x1, 0x40}, @NL80211_STA_WME_MAX_SP={0x5}, @NL80211_STA_WME_MAX_SP={0x5, 0x2, 0x70}, @NL80211_STA_WME_MAX_SP={0x5, 0x2, 0x81}, @NL80211_STA_WME_UAPSD_QUEUES={0x5, 0x1, 0xff}, @NL80211_STA_WME_UAPSD_QUEUES={0x5, 0x1, 0x9}, @NL80211_STA_WME_UAPSD_QUEUES={0x5, 0x1, 0x7}]}, @NL80211_ATTR_STA_FLAGS2={0xc, 0x43, {0x4, 0x9}}, @NL80211_ATTR_STA_PLINK_STATE={0x5, 0x74, 0x1}]}, 0x84}, 0x1, 0x0, 0x0, 0x90}, 0x1) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000140)={'ip6_vti0\x00', &(0x7f0000000040)={'ip6tnl0\x00', 0x0, 0x2f, 0x7, 0x6, 0x6, 0x20, @private1, @local, 0x1, 0x8, 0x3f, 0x8}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000000)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @private1, 0x0, 0x0, 0x9}}) 13:09:51 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x5c}}, 0x0) [ 883.518201] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 883.562799] syz_tun: This device is already a HSR slave. 13:09:51 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, 0x0, 0x0) 13:09:51 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) statx(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) 13:09:51 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_GET(r0, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000001600)={0x20, 0x1401, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x300}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x4}]}, 0x20}}, 0x0) 13:09:51 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x8}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:09:51 executing program 3: unshare(0xc000480) r0 = fanotify_init(0x0, 0x0) fanotify_mark(r0, 0x1, 0x40000008, 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00') [ 883.828588] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 883.852560] syz_tun: This device is already a HSR slave. 13:09:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000680)={0x1, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80045, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) (async, rerun: 32) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 32) sendmsg$NFULNL_MSG_CONFIG(r1, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000000)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x84) (async, rerun: 32) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (rerun: 32) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r2, &(0x7f0000000640)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000005c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES64=r2, @ANYRES16=r1, @ANYRES32=0x0, @ANYRESDEC=r0, @ANYRES32, @ANYRES8, @ANYRES32=0x0, @ANYBLOB="080001000200000008001d00", @ANYRES32=r1, @ANYBLOB="730fca408a8504c01583f282a224df7e8448de241ebd0767d4162695e524f2d817b92adc1736696e2994cc4b39af3c40bbdfcc720e0adb074d14e46811eeec8c6616bae6659f742234693cf48e7067f773c59291ffffffffffffffff57552a5c8d53247f10a865eeb3d0a3fae23aef42ec4f6b0c01916b55dfbd3cf600000000"], 0x64}, 0x1, 0x0, 0x0, 0x4090}, 0x4004) (async, rerun: 64) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) (rerun: 64) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) (async) preadv(r3, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) (async, rerun: 64) ioctl$BTRFS_IOC_DEV_INFO(r3, 0xd000941e, &(0x7f0000001600)={0x0, "4800dcd500"}) (rerun: 64) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r3) (async) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000100)={0x4, 0x80, 0xff, 0x2, 0x7, 0x7, 0x0, 0x3, 0x41, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x6, 0x4, @perf_config_ext={0x9, 0x7}, 0x4, 0x49c5f8e7, 0x6, 0x7, 0x80, 0x80, 0x401, 0x0, 0x6, 0x0, 0x1}) (async, rerun: 32) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x73, 0x9, 0x9, 0x0, 0x3, 0xc000, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x0, 0x2}, 0x80000, 0x2, 0x2, 0x7, 0x1, 0x3, 0x4, 0x0, 0x80, 0x0, 0x9}, r4, 0x0, 0xffffffffffffffff, 0x1) 13:09:52 executing program 0: unshare(0x400) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_LIST(r0, 0x0, 0x0) 13:09:52 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0x5452, &(0x7f0000001880)={{0x1, 0x1, 0x18}, './file1\x00'}) 13:09:52 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000004000260000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0xe6, &(0x7f0000000100)=""/230, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:09:52 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x0, 0x0, 0x0, 0x0, 0x804, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4}, 0x48) 13:09:52 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="0e00000009000d00ffff000008000b008000000008000b0008000000060005003f060014060005002207000008000b00ffff000007000100667700006c0002001400030076657468300000000000000000000000140003006261746164765f736c6176655f3100001400030076657468305f766972745f77696669001400030070696d367265673100000000000000000800010002119371e63d351c42fc8a000700080001000500050008000500ffffff7f648150c4ceaa7dd1a0d0d475cf2ad4f3edd8ad2f40680663047205957135710a8568f4f2be375119aba03c6339236c72fcc387fa25a49b2caad6c4362b117c0cb1ab62d1266265173d5e81529e3038840fb985a64a3fc2e74e1c03b7168b9efdb16c2780d254b05444bb2e701aabbc2bf3e9f4ea99dc25aaa1b6b6593e8878ae7525beafd4a0b4fb32180c485a17dc8ba9409d4bece6d7f8512d9b996a912da234cace74de11499d7abe9606"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x9}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:09:52 executing program 1: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="11000000011409"], 0x70}}, 0x0) 13:09:52 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0x5452, 0x0) 13:09:52 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/214, 0x1c000, 0x800, 0x566, 0x1}, 0x20) 13:09:52 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="70000000101409"], 0x70}}, 0x0) [ 884.466583] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 884.495267] (unnamed net_device) (uninitialized): HSR: Slave1 device not specified 13:09:52 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0xa}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:09:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001280)) 13:09:52 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0x5450, 0x0) 13:09:52 executing program 1: write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000000)='FREEZING\x00', 0x9) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000001f00)=""/144) 13:09:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000680)={0x1, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80045, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NFULNL_MSG_CONFIG(r1, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000000)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x84) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r2, &(0x7f0000000640)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000005c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES64=r2, @ANYRES16=r1, @ANYRES32=0x0, @ANYRESDEC=r0, @ANYRES32, @ANYRES8, @ANYRES32=0x0, @ANYBLOB="080001000200000008001d00", @ANYRES32=r1, @ANYBLOB="730fca408a8504c01583f282a224df7e8448de241ebd0767d4162695e524f2d817b92adc1736696e2994cc4b39af3c40bbdfcc720e0adb074d14e46811eeec8c6616bae6659f742234693cf48e7067f773c59291ffffffffffffffff57552a5c8d53247f10a865eeb3d0a3fae23aef42ec4f6b0c01916b55dfbd3cf600000000"], 0x64}, 0x1, 0x0, 0x0, 0x4090}, 0x4004) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) preadv(r3, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r3, 0xd000941e, &(0x7f0000001600)={0x0, "4800dcd500"}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r3) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000100)={0x4, 0x80, 0xff, 0x2, 0x7, 0x7, 0x0, 0x3, 0x41, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x6, 0x4, @perf_config_ext={0x9, 0x7}, 0x4, 0x49c5f8e7, 0x6, 0x7, 0x80, 0x80, 0x401, 0x0, 0x6, 0x0, 0x1}) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x73, 0x9, 0x9, 0x0, 0x3, 0xc000, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x0, 0x2}, 0x80000, 0x2, 0x2, 0x7, 0x1, 0x3, 0x4, 0x0, 0x80, 0x0, 0x9}, r4, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000680)={0x1, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80045, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) (async) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) (async) pipe(&(0x7f0000000480)) (async) sendmsg$NFULNL_MSG_CONFIG(r1, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000000)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x84) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r2, &(0x7f0000000640)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000005c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES64=r2, @ANYRES16=r1, @ANYRES32=0x0, @ANYRESDEC=r0, @ANYRES32, @ANYRES8, @ANYRES32=0x0, @ANYBLOB="080001000200000008001d00", @ANYRES32=r1, @ANYBLOB="730fca408a8504c01583f282a224df7e8448de241ebd0767d4162695e524f2d817b92adc1736696e2994cc4b39af3c40bbdfcc720e0adb074d14e46811eeec8c6616bae6659f742234693cf48e7067f773c59291ffffffffffffffff57552a5c8d53247f10a865eeb3d0a3fae23aef42ec4f6b0c01916b55dfbd3cf600000000"], 0x64}, 0x1, 0x0, 0x0, 0x4090}, 0x4004) (async) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.current\x00', 0x275a, 0x0) (async) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[], 0x208e24b) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) (async) preadv(r3, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) (async) ioctl$BTRFS_IOC_DEV_INFO(r3, 0xd000941e, &(0x7f0000001600)={0x0, "4800dcd500"}) (async) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r3) (async) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000100)={0x4, 0x80, 0xff, 0x2, 0x7, 0x7, 0x0, 0x3, 0x41, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x6, 0x4, @perf_config_ext={0x9, 0x7}, 0x4, 0x49c5f8e7, 0x6, 0x7, 0x80, 0x80, 0x401, 0x0, 0x6, 0x0, 0x1}) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) (async) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x73, 0x9, 0x9, 0x0, 0x3, 0xc000, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x0, 0x2}, 0x80000, 0x2, 0x2, 0x7, 0x1, 0x3, 0x4, 0x0, 0x80, 0x0, 0x9}, r4, 0x0, 0xffffffffffffffff, 0x1) (async) 13:09:52 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$MRT_DONE(r0, 0x6, 0x6c9, 0x20000000, 0x4) 13:09:52 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0xb}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) [ 884.708124] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 884.726934] (unnamed net_device) (uninitialized): HSR: Slave1 device not specified 13:09:53 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="70000000071409"], 0x70}}, 0x0) 13:09:53 executing program 1: unshare(0xc000480) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8903, &(0x7f00000002c0)={'ip6gre0\x00', 0x0}) 13:09:53 executing program 0: r0 = semget$private(0x0, 0x3, 0x0) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000001f00)=""/144) [ 884.897046] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 13:09:53 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)=').\x00') 13:09:53 executing program 3: unshare(0x400) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) write$tun(r0, 0x0, 0x0) 13:09:53 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0xf}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) [ 884.942160] (unnamed net_device) (uninitialized): HSR: Slave1 device not specified 13:09:53 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0x2, &(0x7f0000001880)={{0x1, 0x1, 0x18}, './file1\x00'}) 13:09:53 executing program 5: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) perf_event_open(0x0, r0, 0x10000007, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r1, 0xd000941e, &(0x7f0000001600)={0x0, "48006cf0a81704e3c7c90110455edcd5"}) perf_event_open(&(0x7f0000000100)={0x7, 0x80, 0x5a, 0x5, 0x2, 0x1, 0x0, 0x7, 0x40248, 0x9, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0x0, 0x5}, 0x201, 0x0, 0x8, 0x7, 0x7, 0x8, 0x101, 0x0, 0x80, 0x0, 0x400}, r0, 0x3, r1, 0x8) migrate_pages(r0, 0x100000000, &(0x7f0000000080)=0xffffffffffff8001, &(0x7f00000000c0)=0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1e40, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000040)=0x180000) r3 = syz_init_net_socket$ax25(0x3, 0x5, 0x1) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) get_robust_list(r0, &(0x7f0000000380)=&(0x7f0000000340)={&(0x7f0000000280), 0x0, &(0x7f0000000300)={&(0x7f00000002c0)}}, &(0x7f00000003c0)=0x18) 13:09:53 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="700000000e1409"], 0x70}}, 0x0) 13:09:53 executing program 3: socket$xdp(0x2c, 0x3, 0x0) pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x8}, 0x0, &(0x7f00000000c0)={0x0, 0x989680}, 0x0) 13:09:53 executing program 1: semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000001f00)=""/144) 13:09:53 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x5) [ 885.155913] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 885.171483] (unnamed net_device) (uninitialized): HSR: Slave2 device not specified 13:09:53 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x10}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:09:53 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000540), r0) 13:09:53 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000004000790000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0xe6, &(0x7f0000000100)=""/230, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:09:53 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl2\x00', 0x0, 0x4, 0xca, 0x5, 0x903, 0x50, @local, @remote, 0x20, 0x20, 0x1, 0x2}}) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000240)={'vxcan1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000340)={'ip6_vti0\x00', &(0x7f0000000280)={'ip6tnl0\x00', r3, 0x29, 0x5, 0x0, 0x1ff, 0x34, @initdev={0xfe, 0x88, '\x00', 0x4, 0x0}, @empty, 0x10, 0x80, 0x8, 0x400}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000040)={'ip6gre0\x00', &(0x7f00000000c0)={'syztnl0\x00', r3, 0x29, 0x0, 0x1, 0x932c, 0x53, @private2={0xfc, 0x2, '\x00', 0x1}, @rand_addr=' \x01\x00', 0x20, 0x8000, 0x3, 0x9}}) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r4, 0xc0189379, &(0x7f0000001700)={{0x1, 0x1, 0x18}, './file0\x00'}) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r4, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, r5}, './file0\x00'}) 13:09:53 executing program 0: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000a80)) [ 885.365098] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 885.413528] (unnamed net_device) (uninitialized): HSR: Slave2 device not specified 13:09:53 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="0e00000009000d00ffff000008000b008000000008000b0008000000060005003f060014060005002207000008000b00ffff000007000100667700006c0002001400030076657468300000000000000000000000140003006261746164765f736c6176655f3100001400030076657468305f766972745f77696669001400030070696d367265673100000000000000000800010002119371e63d351c42fc8a000700080001000500050008000500ffffff7f648150c4ceaa7dd1a0d0d475cf2ad4f3edd8ad2f40680663047205957135710a8568f4f2be375119aba03c6339236c72fcc387fa25a49b2caad6c4362b117c0cb1ab62d1266265173d5e81529e3038840fb985a64a3fc2e74e1c03b7168b9efdb16c2780d254b05444bb2e701aabbc2bf3e9f4ea99dc25aaa1b6b6593e8878ae7525beafd4a0b4fb32180c485a17dc8ba9409d4bece6d7f8512d9b996a912da234cace74de11499d7abe9606"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x14}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:09:53 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="70000000021409"], 0x70}}, 0x0) 13:09:53 executing program 5: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) perf_event_open(0x0, r0, 0x10000007, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r1, 0xd000941e, &(0x7f0000001600)={0x0, "48006cf0a81704e3c7c90110455edcd5"}) perf_event_open(&(0x7f0000000100)={0x7, 0x80, 0x5a, 0x5, 0x2, 0x1, 0x0, 0x7, 0x40248, 0x9, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0x0, 0x5}, 0x201, 0x0, 0x8, 0x7, 0x7, 0x8, 0x101, 0x0, 0x80, 0x0, 0x400}, r0, 0x3, r1, 0x8) migrate_pages(r0, 0x100000000, &(0x7f0000000080)=0xffffffffffff8001, &(0x7f00000000c0)=0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1e40, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000040)=0x180000) r3 = syz_init_net_socket$ax25(0x3, 0x5, 0x1) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) get_robust_list(r0, &(0x7f0000000380)=&(0x7f0000000340)={&(0x7f0000000280), 0x0, &(0x7f0000000300)={&(0x7f00000002c0)}}, &(0x7f00000003c0)=0x18) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ptrace(0x10, r0) (async) perf_event_open(0x0, r0, 0x10000007, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.current\x00', 0x275a, 0x0) (async) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0x208e24b) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) (async) preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) (async) ioctl$BTRFS_IOC_DEV_INFO(r1, 0xd000941e, &(0x7f0000001600)={0x0, "48006cf0a81704e3c7c90110455edcd5"}) (async) perf_event_open(&(0x7f0000000100)={0x7, 0x80, 0x5a, 0x5, 0x2, 0x1, 0x0, 0x7, 0x40248, 0x9, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0x0, 0x5}, 0x201, 0x0, 0x8, 0x7, 0x7, 0x8, 0x101, 0x0, 0x80, 0x0, 0x400}, r0, 0x3, r1, 0x8) (async) migrate_pages(r0, 0x100000000, &(0x7f0000000080)=0xffffffffffff8001, &(0x7f00000000c0)=0x4) (async) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1e40, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000040)=0x180000) (async) syz_init_net_socket$ax25(0x3, 0x5, 0x1) (async) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000200)) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) get_robust_list(r0, &(0x7f0000000380)=&(0x7f0000000340)={&(0x7f0000000280), 0x0, &(0x7f0000000300)={&(0x7f00000002c0)}}, &(0x7f00000003c0)=0x18) (async) 13:09:53 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0x801c581f, 0x0) 13:09:53 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_DELLINK(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x18, 0x1404, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x5}]}, 0x18}}, 0x0) 13:09:53 executing program 0: unshare(0x28060680) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) 13:09:53 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0x5451, 0x0) [ 885.663824] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 885.693207] (unnamed net_device) (uninitialized): HSR: Slave1 device not specified 13:09:53 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000d80), 0x0, 0x0) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, 0x0, 0x0) 13:09:53 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x33}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:09:53 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000004000d60000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0xe6, &(0x7f0000000100)=""/230, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:09:54 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000001880)={{0x300, 0x1, 0x18}, './file1\x00'}) 13:09:54 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0x4020940d, &(0x7f0000001880)={{0x1, 0x1, 0x18}, './file1\x00'}) 13:09:54 executing program 1: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_DELLINK(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x10, 0x1}, 0x10}}, 0x0) 13:09:54 executing program 5: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) perf_event_open(0x0, r0, 0x10000007, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r1, 0xd000941e, &(0x7f0000001600)={0x0, "48006cf0a81704e3c7c90110455edcd5"}) perf_event_open(&(0x7f0000000100)={0x7, 0x80, 0x5a, 0x5, 0x2, 0x1, 0x0, 0x7, 0x40248, 0x9, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0x0, 0x5}, 0x201, 0x0, 0x8, 0x7, 0x7, 0x8, 0x101, 0x0, 0x80, 0x0, 0x400}, r0, 0x3, r1, 0x8) migrate_pages(r0, 0x100000000, &(0x7f0000000080)=0xffffffffffff8001, &(0x7f00000000c0)=0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1e40, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000040)=0x180000) r3 = syz_init_net_socket$ax25(0x3, 0x5, 0x1) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000200)) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) get_robust_list(r0, &(0x7f0000000380)=&(0x7f0000000340)={&(0x7f0000000280), 0x0, &(0x7f0000000300)={&(0x7f00000002c0)}}, &(0x7f00000003c0)=0x18) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ptrace(0x10, r0) (async) perf_event_open(0x0, r0, 0x10000007, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.current\x00', 0x275a, 0x0) (async) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0x208e24b) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) (async) preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) (async) ioctl$BTRFS_IOC_DEV_INFO(r1, 0xd000941e, &(0x7f0000001600)={0x0, "48006cf0a81704e3c7c90110455edcd5"}) (async) perf_event_open(&(0x7f0000000100)={0x7, 0x80, 0x5a, 0x5, 0x2, 0x1, 0x0, 0x7, 0x40248, 0x9, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0x0, 0x5}, 0x201, 0x0, 0x8, 0x7, 0x7, 0x8, 0x101, 0x0, 0x80, 0x0, 0x400}, r0, 0x3, r1, 0x8) (async) migrate_pages(r0, 0x100000000, &(0x7f0000000080)=0xffffffffffff8001, &(0x7f00000000c0)=0x4) (async) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1e40, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000040)=0x180000) (async) syz_init_net_socket$ax25(0x3, 0x5, 0x1) (async) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000200)) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) get_robust_list(r0, &(0x7f0000000380)=&(0x7f0000000340)={&(0x7f0000000280), 0x0, &(0x7f0000000300)={&(0x7f00000002c0)}}, &(0x7f00000003c0)=0x18) (async) 13:09:54 executing program 0: request_key(&(0x7f0000000000)='user\x00', 0x0, 0x0, 0xfffffffffffffffe) 13:09:54 executing program 2: unshare(0xc000480) r0 = timerfd_create(0x0, 0x0) ioctl$TFD_IOC_SET_TICKS(r0, 0x40085400, &(0x7f0000000140)=0x4) [ 885.961777] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 885.978180] autofs4:pid:31504:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(768.1), cmd(0xc018937b) 13:09:54 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x34}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) [ 886.011350] (unnamed net_device) (uninitialized): HSR: Slave1 device not specified [ 886.044743] autofs4:pid:31504:validate_dev_ioctl: invalid device control module version supplied for cmd(0xc018937b) 13:09:54 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8936, &(0x7f00000002c0)={'ip6gre0\x00', 0x0}) 13:09:54 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000d80), 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) 13:09:54 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x10120) 13:09:54 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180), 0x201, 0x0) write$vga_arbiter(r0, &(0x7f00000001c0)=@target={'target ', {'PCI:', '15', ':', '1a', ':', '9', '.', '0'}}, 0x15) 13:09:54 executing program 1: getrandom(&(0x7f0000000000)=""/21, 0xfffffffffffffe12, 0x0) bpf$MAP_CREATE(0x18, 0x0, 0x0) 13:09:54 executing program 2: fanotify_mark(0xffffffffffffffff, 0xc8, 0x0, 0xffffffffffffffff, 0x0) 13:09:54 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x3c}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) [ 886.255234] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 886.281407] (unnamed net_device) (uninitialized): HSR: Slave1 device not specified 13:09:54 executing program 3: syz_open_dev$loop(&(0x7f0000000180), 0xffffffffffffffff, 0x244080) 13:09:54 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x4000000000000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x39, 0x9, 0x2, 0x2, 0x0, 0x2, 0x4000, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x8041, 0x8, 0x400, 0xe, 0x1, 0x200, 0x2, 0x0, 0x7, 0x0, 0x400}, 0xffffffffffffffff, 0x10, r0, 0xa) 13:09:54 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_GET(r0, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000001600)={0x20, 0x1407, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x4, 0x2}]}, 0x20}}, 0x0) [ 886.491429] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.4'. 13:09:54 executing program 3: setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) [ 886.532188] (unnamed net_device) (uninitialized): HSR: Slave1 device not specified 13:09:54 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x4000000000000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x39, 0x9, 0x2, 0x2, 0x0, 0x2, 0x4000, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x8041, 0x8, 0x400, 0xe, 0x1, 0x200, 0x2, 0x0, 0x7, 0x0, 0x400}, 0xffffffffffffffff, 0x10, r0, 0xa) 13:09:54 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x44}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:09:54 executing program 2: r0 = socket(0x2c, 0x3, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, 0x0, 0x0) [ 886.786578] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.4'. [ 886.822329] (unnamed net_device) (uninitialized): HSR: Slave1 device not specified 13:09:55 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={0x0, {0x2, 0x0, @empty}, {}, {0x2, 0x0, @empty}}) 13:09:55 executing program 0: unshare(0x400) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(0xffffffffffffffff, 0x0, 0x0) 13:09:55 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x5, &(0x7f0000000200)=@raw=[@btf_id, @generic, @func, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}], &(0x7f0000000280)='syzkaller\x00', 0x4, 0xda, &(0x7f00000002c0)=""/218, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:09:55 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x4000000000000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x39, 0x9, 0x2, 0x2, 0x0, 0x2, 0x4000, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x8041, 0x8, 0x400, 0xe, 0x1, 0x200, 0x2, 0x0, 0x7, 0x0, 0x400}, 0xffffffffffffffff, 0x10, r0, 0xa) 13:09:55 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000380), 0x0, &(0x7f0000000400)={0x0, 0x0, @c}, 0x29, r0) 13:09:55 executing program 0: unshare(0xc000680) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f00000004c0), 0x4) 13:09:55 executing program 2: unshare(0xc000480) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000080), 0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) 13:09:55 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x2}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:09:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) perf_event_open(0x0, r0, 0x10000007, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0x208e24b) r2 = syz_clone(0x11024300, &(0x7f0000000300)="3eeb80af28a346b3606b8a60daee33d83816c73e0370d1f1c0e47ca0030a3b3dfcb4255d687cb96bd113baf098b5a22859096ff518f6dc269facb8bc35d6cc1cbc15b6e6eab0b4697b8032424fb291ab67db", 0x52, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000500)="b7d6bc22b5f120b82a9fdd214aee02d4909a340915a220cfffeea1e1765bf9414fbf26a53d8a75c19b60036368a737271a9b90734b0cd181dcf8260f1e940f819886c4af28f5ecf98cb74787488ede7eec0dc59f28fe67827c17acfa73692a60ee4fb09650b43ed5cdd1321dfa89d6cf9b9432e36a3774455c5520e66e787435568c5d09aef087da406efacc392b6596711ce6fbfa5e150ad99df919df11437a9b5a90a3ff6071aa9fcabfab722c52bc47ec2a05ab66837682b0a8aa18a20db6e09380e52a39c0e582dc52a2744d4eac1d063fcdf1f0") r3 = perf_event_open(&(0x7f0000000680)={0x1, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80045, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NFULNL_MSG_CONFIG(r4, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000000)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x84) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r5, &(0x7f0000000640)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000005c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES64=r5, @ANYRES16=r4, @ANYRES32=0x0, @ANYRESDEC=r3, @ANYRES32, @ANYRES8, @ANYRES32=0x0, @ANYBLOB="080001000200000008001d00", @ANYRES32=r4, @ANYBLOB="730fca408a8504c01583f282a224df7e8448de241ebd0767d4162695e524f2d817b92adc1736696e2994cc4b39af3c40bbdfcc720e0adb074d14e46811eeec8c6616bae6659f742234693cf48e7067f773c59291ffffffffffffffff57552a5c8d53247f10a865eeb3d0a3fae23aef42ec4f6b0c01916b55dfbd3cf600000000"], 0x64}, 0x1, 0x0, 0x0, 0x4090}, 0x4004) write$binfmt_misc(r4, &(0x7f0000000000)=ANY=[], 0xfffffecc) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f0000000000)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r6, 0x0) preadv(r6, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r6, 0xd000941e, &(0x7f0000001600)={0x0, "4800dcd500"}) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000001600)={0x0, "4800dcd500"}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) read$FUSE(0xffffffffffffffff, &(0x7f0000002600)={0x2020}, 0x2020) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x8, 0x0, 0x0, 0x8000, 0x4000, 0x9, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x2, 0x5, 0xffffffff, 0x2, 0x7, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1000}, r2, 0xc, r6, 0x8) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r1, 0xd000941e, &(0x7f0000001600)={0x0, "48006cf0a81704e3c7c90110455edcd5"}) perf_event_open(&(0x7f0000000100)={0x7, 0x80, 0x5a, 0x5, 0x2, 0x1, 0x0, 0x7, 0x40248, 0x9, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0x0, 0x5}, 0x201, 0x0, 0x8, 0x7, 0x7, 0x8, 0x101, 0x0, 0x80, 0x0, 0x400}, r0, 0x3, r1, 0x8) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x9, 0x5, 0x7f, 0xff, 0x0, 0x401, 0x29040, 0xa, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1000}, 0x0, 0x130, 0x5, 0x9, 0x0, 0x88d0, 0x5, 0x0, 0x6a, 0x0, 0x8000}, 0x0, 0xb, r1, 0x8) 13:09:55 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x5}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:09:55 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x890c, &(0x7f00000002c0)={'ip6gre0\x00', 0x0}) 13:09:55 executing program 0: syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$fou(0x0, 0xffffffffffffffff) 13:09:55 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="70000000011409"], 0x70}}, 0x0) 13:09:55 executing program 1: request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0) 13:09:55 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x6}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:09:55 executing program 2: unshare(0xc000480) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x5450, 0x0) 13:09:55 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="18320000020000000000000000000000183600000400000000000000000000001843000004000000000000000000000085"], &(0x7f0000000080)='syzkaller\x00', 0x4, 0xcb, &(0x7f00000000c0)=""/203, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:09:55 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000004000040000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x4, 0xe6, &(0x7f0000000100)=""/230, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:09:55 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="100000000f1409"], 0x70}}, 0x0) 13:09:55 executing program 2: shmat(0xffffffffffffffff, &(0x7f0000ffc000/0x1000)=nil, 0x0) [ 887.811707] syz_tun: This device is already a HSR slave. 13:09:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) (async) perf_event_open(0x0, r0, 0x10000007, 0xffffffffffffffff, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0x208e24b) (async, rerun: 32) r2 = syz_clone(0x11024300, &(0x7f0000000300)="3eeb80af28a346b3606b8a60daee33d83816c73e0370d1f1c0e47ca0030a3b3dfcb4255d687cb96bd113baf098b5a22859096ff518f6dc269facb8bc35d6cc1cbc15b6e6eab0b4697b8032424fb291ab67db", 0x52, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000500)="b7d6bc22b5f120b82a9fdd214aee02d4909a340915a220cfffeea1e1765bf9414fbf26a53d8a75c19b60036368a737271a9b90734b0cd181dcf8260f1e940f819886c4af28f5ecf98cb74787488ede7eec0dc59f28fe67827c17acfa73692a60ee4fb09650b43ed5cdd1321dfa89d6cf9b9432e36a3774455c5520e66e787435568c5d09aef087da406efacc392b6596711ce6fbfa5e150ad99df919df11437a9b5a90a3ff6071aa9fcabfab722c52bc47ec2a05ab66837682b0a8aa18a20db6e09380e52a39c0e582dc52a2744d4eac1d063fcdf1f0") (async, rerun: 32) r3 = perf_event_open(&(0x7f0000000680)={0x1, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80045, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NFULNL_MSG_CONFIG(r4, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000000)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x84) (async) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r5, &(0x7f0000000640)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000005c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES64=r5, @ANYRES16=r4, @ANYRES32=0x0, @ANYRESDEC=r3, @ANYRES32, @ANYRES8, @ANYRES32=0x0, @ANYBLOB="080001000200000008001d00", @ANYRES32=r4, @ANYBLOB="730fca408a8504c01583f282a224df7e8448de241ebd0767d4162695e524f2d817b92adc1736696e2994cc4b39af3c40bbdfcc720e0adb074d14e46811eeec8c6616bae6659f742234693cf48e7067f773c59291ffffffffffffffff57552a5c8d53247f10a865eeb3d0a3fae23aef42ec4f6b0c01916b55dfbd3cf600000000"], 0x64}, 0x1, 0x0, 0x0, 0x4090}, 0x4004) (async) write$binfmt_misc(r4, &(0x7f0000000000)=ANY=[], 0xfffffecc) (async) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f0000000000)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r6, 0x0) preadv(r6, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) (async) ioctl$BTRFS_IOC_DEV_INFO(r6, 0xd000941e, &(0x7f0000001600)={0x0, "4800dcd500"}) (async) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000001600)={0x0, "4800dcd500"}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) (async, rerun: 32) read$FUSE(0xffffffffffffffff, &(0x7f0000002600)={0x2020}, 0x2020) (async, rerun: 32) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x8, 0x0, 0x0, 0x8000, 0x4000, 0x9, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x2, 0x5, 0xffffffff, 0x2, 0x7, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1000}, r2, 0xc, r6, 0x8) (async, rerun: 32) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) (rerun: 32) preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) (async) ioctl$BTRFS_IOC_DEV_INFO(r1, 0xd000941e, &(0x7f0000001600)={0x0, "48006cf0a81704e3c7c90110455edcd5"}) (async) perf_event_open(&(0x7f0000000100)={0x7, 0x80, 0x5a, 0x5, 0x2, 0x1, 0x0, 0x7, 0x40248, 0x9, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0x0, 0x5}, 0x201, 0x0, 0x8, 0x7, 0x7, 0x8, 0x101, 0x0, 0x80, 0x0, 0x400}, r0, 0x3, r1, 0x8) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x9, 0x5, 0x7f, 0xff, 0x0, 0x401, 0x29040, 0xa, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1000}, 0x0, 0x130, 0x5, 0x9, 0x0, 0x88d0, 0x5, 0x0, 0x6a, 0x0, 0x8000}, 0x0, 0xb, r1, 0x8) 13:09:56 executing program 3: clock_gettime(0x0, &(0x7f0000000240)={0x0}) pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x2}, &(0x7f00000000c0)={r0}, 0x0) 13:09:56 executing program 0: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000004a00)=[{}], 0x1f4) 13:09:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = getpgid(0x0) sendmsg$netlink(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000003240)=ANY=[], 0x8d0}], 0x1, &(0x7f0000000080)=[@cred={{0x1c, 0x1, 0x2, {r1}}}], 0x20}, 0x0) 13:09:56 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/block/nbd10', 0x202001, 0x0) 13:09:56 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x8}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:09:56 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_GET_SE(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {}, ["", "", "", "", ""]}, 0xfce5}}, 0x0) 13:09:56 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000280)={0x53, 0xfffffffffffffffc, 0x21, 0x7e, @buffer={0x0, 0x27, &(0x7f0000000080)=""/39}, &(0x7f00000000c0)="03f40bd1300f082b2091cd4784c0b046e0ada868877da720ec71996e473e701c71", &(0x7f00000001c0)=""/93, 0x5, 0x0, 0x2, 0x0}) 13:09:56 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x227e, 0x0) 13:09:56 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="0e00000009000d00ffff000008000b008000000008000b0008000000060005003f060014060005002207000008000b00ffff000007000100667700006c0002001400030076657468300000000000000000000000140003006261746164765f736c6176655f3100001400030076657468305f766972745f77696669001400030070696d367265673100000000000000000800010002119371e63d351c42fc8a000700080001000500050008000500ffffff7f648150c4ceaa7dd1a0d0d475cf2ad4f3edd8ad2f40680663047205957135710a8568f4f2be375119aba03c6339236c72fcc387fa25a49b2caad6c4362b117c0cb1ab62d1266265173d5e81529e3038840fb985a64a3fc2e74e1c03b7168b9efdb16c2780d254b05444bb2e701aabbc2bf3e9f4ea99dc25aaa1b6b6593e8878ae7525beafd4a0b4fb32180c485a17dc8ba9409d4bece6d7f8512d9b996a912da234cace74de11499d7abe9606"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x9}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) [ 888.514609] syz_tun: This device is already a HSR slave. 13:09:56 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x300}, 0x0) 13:09:56 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000180), r0) sendmsg$NLBL_MGMT_C_VERSION(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0100000000000000000008000072"], 0x2c}}, 0x0) [ 888.742847] syz_tun: This device is already a HSR slave. 13:09:57 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) (async, rerun: 32) perf_event_open(0x0, r0, 0x10000007, 0xffffffffffffffff, 0x0) (async, rerun: 32) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0x208e24b) (async, rerun: 32) r2 = syz_clone(0x11024300, &(0x7f0000000300)="3eeb80af28a346b3606b8a60daee33d83816c73e0370d1f1c0e47ca0030a3b3dfcb4255d687cb96bd113baf098b5a22859096ff518f6dc269facb8bc35d6cc1cbc15b6e6eab0b4697b8032424fb291ab67db", 0x52, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000500)="b7d6bc22b5f120b82a9fdd214aee02d4909a340915a220cfffeea1e1765bf9414fbf26a53d8a75c19b60036368a737271a9b90734b0cd181dcf8260f1e940f819886c4af28f5ecf98cb74787488ede7eec0dc59f28fe67827c17acfa73692a60ee4fb09650b43ed5cdd1321dfa89d6cf9b9432e36a3774455c5520e66e787435568c5d09aef087da406efacc392b6596711ce6fbfa5e150ad99df919df11437a9b5a90a3ff6071aa9fcabfab722c52bc47ec2a05ab66837682b0a8aa18a20db6e09380e52a39c0e582dc52a2744d4eac1d063fcdf1f0") (rerun: 32) r3 = perf_event_open(&(0x7f0000000680)={0x1, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80045, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NFULNL_MSG_CONFIG(r4, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000000)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x84) (async, rerun: 32) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (rerun: 32) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r5, &(0x7f0000000640)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000005c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES64=r5, @ANYRES16=r4, @ANYRES32=0x0, @ANYRESDEC=r3, @ANYRES32, @ANYRES8, @ANYRES32=0x0, @ANYBLOB="080001000200000008001d00", @ANYRES32=r4, @ANYBLOB="730fca408a8504c01583f282a224df7e8448de241ebd0767d4162695e524f2d817b92adc1736696e2994cc4b39af3c40bbdfcc720e0adb074d14e46811eeec8c6616bae6659f742234693cf48e7067f773c59291ffffffffffffffff57552a5c8d53247f10a865eeb3d0a3fae23aef42ec4f6b0c01916b55dfbd3cf600000000"], 0x64}, 0x1, 0x0, 0x0, 0x4090}, 0x4004) (async) write$binfmt_misc(r4, &(0x7f0000000000)=ANY=[], 0xfffffecc) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f0000000000)=ANY=[], 0x208e24b) (async, rerun: 64) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r6, 0x0) (async, rerun: 64) preadv(r6, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) (async) ioctl$BTRFS_IOC_DEV_INFO(r6, 0xd000941e, &(0x7f0000001600)={0x0, "4800dcd500"}) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000001600)={0x0, "4800dcd500"}) (async) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000002600)={0x2020}, 0x2020) (async) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) (async) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x8, 0x0, 0x0, 0x8000, 0x4000, 0x9, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x2, 0x5, 0xffffffff, 0x2, 0x7, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1000}, r2, 0xc, r6, 0x8) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) (async, rerun: 32) preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) (async, rerun: 32) ioctl$BTRFS_IOC_DEV_INFO(r1, 0xd000941e, &(0x7f0000001600)={0x0, "48006cf0a81704e3c7c90110455edcd5"}) (async) perf_event_open(&(0x7f0000000100)={0x7, 0x80, 0x5a, 0x5, 0x2, 0x1, 0x0, 0x7, 0x40248, 0x9, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0x0, 0x5}, 0x201, 0x0, 0x8, 0x7, 0x7, 0x8, 0x101, 0x0, 0x80, 0x0, 0x400}, r0, 0x3, r1, 0x8) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x9, 0x5, 0x7f, 0xff, 0x0, 0x401, 0x29040, 0xa, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1000}, 0x0, 0x130, 0x5, 0x9, 0x0, 0x88d0, 0x5, 0x0, 0x6a, 0x0, 0x8000}, 0x0, 0xb, r1, 0x8) 13:09:57 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x13, &(0x7f0000000280), 0x4) 13:09:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000000)=0x10001, 0x5f) 13:09:57 executing program 1: setreuid(0xee01, 0x0) add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) 13:09:57 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="0e00000009000d00ffff000008000b008000000008000b0008000000060005003f060014060005002207000008000b00ffff000007000100667700006c0002001400030076657468300000000000000000000000140003006261746164765f736c6176655f3100001400030076657468305f766972745f77696669001400030070696d367265673100000000000000000800010002119371e63d351c42fc8a000700080001000500050008000500ffffff7f648150c4ceaa7dd1a0d0d475cf2ad4f3edd8ad2f40680663047205957135710a8568f4f2be375119aba03c6339236c72fcc387fa25a49b2caad6c4362b117c0cb1ab62d1266265173d5e81529e3038840fb985a64a3fc2e74e1c03b7168b9efdb16c2780d254b05444bb2e701aabbc2bf3e9f4ea99dc25aaa1b6b6593e8878ae7525beafd4a0b4fb32180c485a17dc8ba9409d4bece6d7f8512d9b996a912da234cace74de11499d7abe9606"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0xa}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:09:57 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$nbd(r0, 0x0, 0x44) 13:09:57 executing program 0: socketpair(0x2, 0x3, 0x2, &(0x7f0000000140)) 13:09:57 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) dup3(r1, r0, 0x0) 13:09:57 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x6, 0x0, &(0x7f00000000c0)) 13:09:57 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/block/loop0', 0x0, 0x0) r1 = eventfd2(0x0, 0x0) dup2(r0, r1) [ 889.555126] syz_tun: This device is already a HSR slave. 13:09:57 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0xb}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:09:57 executing program 0: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$FUSE_LSEEK(r0, &(0x7f00000000c0)={0xfffffffffffffc50}, 0x18) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000001c0)) [ 889.801937] syz_tun: This device is already a HSR slave. 13:09:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:09:58 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0x14, 0x0, 0x0, "600307df2ee0376f6e22d554e34e6e40a826d116"}) 13:09:58 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) capset(&(0x7f00000003c0)={0x19980330}, &(0x7f0000000400)) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) 13:09:58 executing program 2: syz_clone(0x72125b945bc8c1d8, 0x0, 0x0, 0x0, 0x0, 0x0) 13:09:58 executing program 0: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000004a00)=[{0x3, 0x1}, {0x3}], 0x2) semctl$GETNCNT(r0, 0x3, 0xe, 0x0) 13:09:58 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="0e00000009000d00ffff000008000b008000000008000b0008000000060005003f060014060005002207000008000b00ffff000007000100667700006c0002001400030076657468300000000000000000000000140003006261746164765f736c6176655f3100001400030076657468305f766972745f77696669001400030070696d367265673100000000000000000800010002119371e63d351c42fc8a000700080001000500050008000500ffffff7f648150c4ceaa7dd1a0d0d475cf2ad4f3edd8ad2f40680663047205957135710a8568f4f2be375119aba03c6339236c72fcc387fa25a49b2caad6c4362b117c0cb1ab62d1266265173d5e81529e3038840fb985a64a3fc2e74e1c03b7168b9efdb16c2780d254b05444bb2e701aabbc2bf3e9f4ea99dc25aaa1b6b6593e8878ae7525beafd4a0b4fb32180c485a17dc8ba9409d4bece6d7f8512d9b996a912da234cace74de11499d7abe9606"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x10}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:09:58 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2283, 0x0) 13:09:58 executing program 3: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000080), 0x8, 0x0) io_setup(0x2, &(0x7f0000001600)=0x0) r2 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/tcp_sack\x00', 0x1, 0x0) io_submit(r1, 0x2, &(0x7f00000008c0)=[&(0x7f0000000380)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) [ 890.028992] IPVS: ftp: loaded support on port[0] = 21 13:09:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 890.082341] syz_tun: This device is already a HSR slave. [ 890.093155] semctl(GETNCNT/GETZCNT) is since 3.16 Single Unix Specification compliant. [ 890.093155] The task syz-executor.0 (31733) triggered the difference, watch for misbehavior. 13:09:58 executing program 1: pipe2(&(0x7f0000000000), 0x0) select(0x40, &(0x7f0000000000), &(0x7f00000001c0)={0xc}, 0x0, 0x0) 13:09:58 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="0e00000009000d00ffff000008000b008000000008000b0008000000060005003f060014060005002207000008000b00ffff000007000100667700006c0002001400030076657468300000000000000000000000140003006261746164765f736c6176655f3100001400030076657468305f766972745f77696669001400030070696d367265673100000000000000000800010002119371e63d351c42fc8a000700080001000500050008000500ffffff7f648150c4ceaa7dd1a0d0d475cf2ad4f3edd8ad2f40680663047205957135710a8568f4f2be375119aba03c6339236c72fcc387fa25a49b2caad6c4362b117c0cb1ab62d1266265173d5e81529e3038840fb985a64a3fc2e74e1c03b7168b9efdb16c2780d254b05444bb2e701aabbc2bf3e9f4ea99dc25aaa1b6b6593e8878ae7525beafd4a0b4fb32180c485a17dc8ba9409d4bece6d7f8512d9b996a912da234cace74de11499d7abe9606"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x14}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:09:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) 13:09:58 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0xc, 0x18, 0x100}) 13:09:58 executing program 3: syz_clone(0x40000000, 0x0, 0x0, &(0x7f0000001140), &(0x7f0000001180), &(0x7f00000011c0)) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x0, 0x3, 0x3, 0x59, 0x0, 0x9, 0x208, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x9, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x200, 0x0, 0x5, 0x5, 0x794, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f0000000000)) 13:09:58 executing program 1: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x418083, 0x0) [ 890.397689] syz_tun: This device is already a HSR slave. [ 890.440561] IPVS: ftp: loaded support on port[0] = 21 13:09:58 executing program 2: syz_open_procfs(0x0, &(0x7f0000000000)='net/stat\x00') 13:09:59 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={0x0}}, 0x0) 13:09:59 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x38}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:09:59 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x4, 0x6, 0x3}) setsockopt$MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x1, 0x5, 0x0, 0xffffffff}, 0xc) 13:09:59 executing program 1: r0 = syz_open_dev$ndb(&(0x7f0000000340), 0x0, 0x42) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000380)) 13:09:59 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, 0x0, 0x0) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc) 13:09:59 executing program 2: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001240), 0x0, 0x0) pselect6(0x40, &(0x7f0000000140)={0x9}, 0x0, 0x0, 0x0, 0x0) 13:09:59 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000000)=0xca46, 0x4) 13:09:59 executing program 0: syz_clone(0x22400, 0x0, 0x0, 0x0, 0x0, 0x0) 13:09:59 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000140)="eb", 0x1}], 0x1}, 0x0) clock_gettime(0x0, &(0x7f00000032c0)={0x0, 0x0}) recvmmsg$unix(r1, &(0x7f0000003200)=[{{&(0x7f0000000080), 0x6e, &(0x7f00000017c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}, {{0x0, 0x0, 0x0}}], 0x2, 0x10022, &(0x7f0000003300)={0x0, r2+60000000}) 13:09:59 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') (async) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x4, 0x6, 0x3}) (async) setsockopt$MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x1, 0x5, 0x0, 0xffffffff}, 0xc) 13:09:59 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000180), r0) sendmsg$NLBL_MGMT_C_VERSION(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x24, r2, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_DOMAIN={0xe, 0x1, 'NLBL_MGMT\xff'}]}, 0x24}}, 0x0) [ 891.038042] syz_tun: This device is already a HSR slave. 13:09:59 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x63}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:09:59 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000280)={0x53, 0x0, 0x6, 0x0, @buffer={0x0, 0x27, &(0x7f0000000080)=""/39}, &(0x7f00000000c0)="03f40bd1300f", 0x0, 0x0, 0x0, 0x0, 0x0}) 13:09:59 executing program 1: r0 = socket(0x26, 0x5, 0x0) recvmsg$unix(r0, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) 13:09:59 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000180), r0) sendmsg$NLBL_MGMT_C_VERSION(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x24, r2, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_DOMAIN={0xe, 0x1, 'NLBL_MGMT\t'}]}, 0x24}}, 0x0) 13:09:59 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') (async, rerun: 32) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x4, 0x6, 0x3}) (async, rerun: 32) setsockopt$MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x1, 0x5, 0x0, 0xffffffff}, 0xc) 13:09:59 executing program 3: r0 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x22b40) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, 0x0) 13:09:59 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000180)=ANY=[@ANYBLOB="bf"]) [ 891.333832] syz_tun: This device is already a HSR slave. 13:09:59 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x7800}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:09:59 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000340), r0) sendmsg$NLBL_UNLABEL_C_LIST(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x14, r2, 0x32d}, 0x14}}, 0x0) 13:09:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006a80)={0x0, 0x0, &(0x7f0000003900)=[{&(0x7f0000000000)={0x18, 0x0, 0x0, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0xfffffdef}], 0x1}, 0x0) 13:09:59 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/block/loop0', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000080)={0x2020}, 0xffffffffffffffb9) 13:09:59 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r0, 0x0, 0x0, 0x10040, 0x0, 0x0) 13:09:59 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x82, 0x0, 0xffffffffffffffff, 0xd000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x4, r0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) perf_event_open(0x0, r2, 0x10000007, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) preadv(r3, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r3, 0xd000941e, &(0x7f0000001600)={0x0, "48006cf0a81704e3c7c90110455edcd5"}) perf_event_open(&(0x7f0000000100)={0x7, 0x80, 0x5a, 0x5, 0x2, 0x1, 0x0, 0x7, 0x40248, 0x9, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0x0, 0x5}, 0x201, 0x0, 0x8, 0x7, 0x7, 0x8, 0x101, 0x0, 0x80, 0x0, 0x400}, r2, 0x3, r3, 0x8) r4 = openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000002300)={0x53, 0xfffffffffffffffd, 0xd, 0x0, @buffer={0x0, 0xd1, &(0x7f00000021c0)=""/209}, &(0x7f00000020c0)="7155640d559dcb778937fb86e0", 0x0, 0x216, 0x0, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x4, 0x20, 0x1, 0x8, 0x0, 0x140, 0x13fb27df7b5ec745, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x8001, 0x8000000000000001}, 0x21, 0x5, 0x3d1, 0x8, 0xffff, 0x0, 0x1, 0x0, 0x0, 0x0, 0xef}, r2, 0x9, r4, 0x1) read(r0, &(0x7f0000000040)=""/158, 0x9e) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x8000) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r5) perf_event_open(0x0, r5, 0x10000007, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f0000000000)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000001600)={0x0, "48006cf0a81704e3c7c90110455edcd5"}) perf_event_open(&(0x7f0000000100)={0x7, 0x80, 0x5a, 0x5, 0x2, 0x1, 0x0, 0x7, 0x40248, 0x9, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0x0, 0x5}, 0x201, 0x0, 0x8, 0x7, 0x7, 0x8, 0x101, 0x0, 0x80, 0x0, 0x400}, 0x0, 0x3, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x80, 0x1f, 0x6, 0x0, 0x80000001, 0x80040, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000200), 0x4}, 0x59898adfca0c9a83, 0x8, 0x3d8, 0x1, 0xaf, 0x80000000, 0x8, 0x0, 0x7, 0x0, 0x1}, 0x0, 0x7, 0xffffffffffffffff, 0x0) preadv(r6, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r6, 0xd000941e, &(0x7f0000001600)={0x0, "48006cf0a81704e3c7c90110455edcd5"}) perf_event_open(&(0x7f0000000100)={0x7, 0x80, 0x5a, 0x5, 0x2, 0x1, 0x0, 0x7, 0x40248, 0x9, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0x0, 0x5}, 0x201, 0x0, 0x8, 0x7, 0x7, 0x8, 0x101, 0x0, 0x80, 0x0, 0x400}, r5, 0x3, r6, 0x8) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x7, 0x34, 0xff, 0x0, 0x0, 0x5, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x4, 0x3}, 0x6d0, 0x3, 0x6, 0x9, 0xffff, 0x38000, 0x3, 0x0, 0x6, 0x0, 0x2}, r5, 0xffffffffffffffff, r1, 0x0) fanotify_init(0x10, 0x101000) 13:09:59 executing program 1: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000004a00)=[{0x0, 0xd402}], 0x1f4) 13:09:59 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2284, 0x0) [ 891.651552] syz_tun: This device is already a HSR slave. 13:09:59 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:09:59 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000000), 0x4) 13:10:00 executing program 2: socketpair(0x1d, 0x0, 0x0, &(0x7f00000002c0)) 13:10:00 executing program 3: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000080), 0x8, 0x0) io_setup(0x2, &(0x7f0000001600)=0x0) r2 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/tcp_sack\x00', 0x1, 0x0) io_submit(r1, 0x2, &(0x7f00000008c0)=[&(0x7f0000000380)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000340)="df", 0x1}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x3}]) 13:10:00 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_EMULATED_HOST(r0, 0x227a, &(0x7f0000000000)) [ 891.917689] syz_tun: This device is already a HSR slave. 13:10:00 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x2}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:10:00 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x82, 0x0, 0xffffffffffffffff, 0xd000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x4, r0, 0x0) (async) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) (async) perf_event_open(0x0, r2, 0x10000007, 0xffffffffffffffff, 0x0) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[], 0x208e24b) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) preadv(r3, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) (async) ioctl$BTRFS_IOC_DEV_INFO(r3, 0xd000941e, &(0x7f0000001600)={0x0, "48006cf0a81704e3c7c90110455edcd5"}) perf_event_open(&(0x7f0000000100)={0x7, 0x80, 0x5a, 0x5, 0x2, 0x1, 0x0, 0x7, 0x40248, 0x9, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0x0, 0x5}, 0x201, 0x0, 0x8, 0x7, 0x7, 0x8, 0x101, 0x0, 0x80, 0x0, 0x400}, r2, 0x3, r3, 0x8) r4 = openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000002300)={0x53, 0xfffffffffffffffd, 0xd, 0x0, @buffer={0x0, 0xd1, &(0x7f00000021c0)=""/209}, &(0x7f00000020c0)="7155640d559dcb778937fb86e0", 0x0, 0x216, 0x0, 0x0, 0x0}) (async) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x4, 0x20, 0x1, 0x8, 0x0, 0x140, 0x13fb27df7b5ec745, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x8001, 0x8000000000000001}, 0x21, 0x5, 0x3d1, 0x8, 0xffff, 0x0, 0x1, 0x0, 0x0, 0x0, 0xef}, r2, 0x9, r4, 0x1) (async) read(r0, &(0x7f0000000040)=""/158, 0x9e) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x8000) (async) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r5) (async) perf_event_open(0x0, r5, 0x10000007, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f0000000000)=ANY=[], 0x208e24b) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r6, 0x0) (async) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000001600)={0x0, "48006cf0a81704e3c7c90110455edcd5"}) (async) perf_event_open(&(0x7f0000000100)={0x7, 0x80, 0x5a, 0x5, 0x2, 0x1, 0x0, 0x7, 0x40248, 0x9, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0x0, 0x5}, 0x201, 0x0, 0x8, 0x7, 0x7, 0x8, 0x101, 0x0, 0x80, 0x0, 0x400}, 0x0, 0x3, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x80, 0x1f, 0x6, 0x0, 0x80000001, 0x80040, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000200), 0x4}, 0x59898adfca0c9a83, 0x8, 0x3d8, 0x1, 0xaf, 0x80000000, 0x8, 0x0, 0x7, 0x0, 0x1}, 0x0, 0x7, 0xffffffffffffffff, 0x0) (async) preadv(r6, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) (async) ioctl$BTRFS_IOC_DEV_INFO(r6, 0xd000941e, &(0x7f0000001600)={0x0, "48006cf0a81704e3c7c90110455edcd5"}) perf_event_open(&(0x7f0000000100)={0x7, 0x80, 0x5a, 0x5, 0x2, 0x1, 0x0, 0x7, 0x40248, 0x9, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0x0, 0x5}, 0x201, 0x0, 0x8, 0x7, 0x7, 0x8, 0x101, 0x0, 0x80, 0x0, 0x400}, r5, 0x3, r6, 0x8) (async) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x7, 0x34, 0xff, 0x0, 0x0, 0x5, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x4, 0x3}, 0x6d0, 0x3, 0x6, 0x9, 0xffff, 0x38000, 0x3, 0x0, 0x6, 0x0, 0x2}, r5, 0xffffffffffffffff, r1, 0x0) (async) fanotify_init(0x10, 0x101000) 13:10:00 executing program 2: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000001100)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000100)="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", 0x171}, 0x68) [ 892.068770] can: request_module (can-proto-0) failed. 13:10:00 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006a80)={0x0, 0x0, &(0x7f0000003900)=[{&(0x7f0000000000)={0x10}, 0x10}], 0x1}, 0x0) bind$netlink(r0, &(0x7f0000000040), 0xc) 13:10:00 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000081c0)='uid_map\x00') read$FUSE(r2, &(0x7f0000000300)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r4 = getegid() sendmsg$unix(r0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r1, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="000000001c000000000000000100000002"], 0x100}, 0x0) [ 892.175446] syz_tun: This device is already a HSR slave. 13:10:00 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvfrom$unix(r0, 0x0, 0x0, 0xc3, 0x0, 0x0) 13:10:00 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="0e00000009000d00ffff000008000b008000000008000b0008000000060005003f060014060005002207000008000b00ffff000007000100667700006c0002001400030076657468300000000000000000000000140003006261746164765f736c6176655f3100001400030076657468305f766972745f77696669001400030070696d367265673100000000000000000800010002119371e63d351c42fc8a000700080001000500050008000500ffffff7f648150c4ceaa7dd1a0d0d475cf2ad4f3edd8ad2f40680663047205957135710a8568f4f2be375119aba03c6339236c72fcc387fa25a49b2caad6c4362b117c0cb1ab62d1266265173d5e81529e3038840fb985a64a3fc2e74e1c03b7168b9efdb16c2780d254b05444bb2e701aabbc2bf3e9f4ea99dc25aaa1b6b6593e8878ae7525beafd4a0b4fb32180c485a17dc8ba9409d4bece6d7f8512d9b996a912da234cace74de11499d7abe9606"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x3}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:10:00 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2285, 0x0) 13:10:00 executing program 3: setresuid(0xee01, 0xee00, 0x0) setresuid(0x0, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 13:10:00 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x7, &(0x7f0000000280), 0x4) 13:10:00 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x82, 0x0, 0xffffffffffffffff, 0xd000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x4, r0, 0x0) (async) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) (async) perf_event_open(0x0, r2, 0x10000007, 0xffffffffffffffff, 0x0) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) preadv(r3, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r3, 0xd000941e, &(0x7f0000001600)={0x0, "48006cf0a81704e3c7c90110455edcd5"}) (async) perf_event_open(&(0x7f0000000100)={0x7, 0x80, 0x5a, 0x5, 0x2, 0x1, 0x0, 0x7, 0x40248, 0x9, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0x0, 0x5}, 0x201, 0x0, 0x8, 0x7, 0x7, 0x8, 0x101, 0x0, 0x80, 0x0, 0x400}, r2, 0x3, r3, 0x8) (async) r4 = openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000002300)={0x53, 0xfffffffffffffffd, 0xd, 0x0, @buffer={0x0, 0xd1, &(0x7f00000021c0)=""/209}, &(0x7f00000020c0)="7155640d559dcb778937fb86e0", 0x0, 0x216, 0x0, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x4, 0x20, 0x1, 0x8, 0x0, 0x140, 0x13fb27df7b5ec745, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x8001, 0x8000000000000001}, 0x21, 0x5, 0x3d1, 0x8, 0xffff, 0x0, 0x1, 0x0, 0x0, 0x0, 0xef}, r2, 0x9, r4, 0x1) read(r0, &(0x7f0000000040)=""/158, 0x9e) (async) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x8000) (async) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r5) (async) perf_event_open(0x0, r5, 0x10000007, 0xffffffffffffffff, 0x0) (async) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f0000000000)=ANY=[], 0x208e24b) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r6, 0x0) (async) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000001600)={0x0, "48006cf0a81704e3c7c90110455edcd5"}) (async) perf_event_open(&(0x7f0000000100)={0x7, 0x80, 0x5a, 0x5, 0x2, 0x1, 0x0, 0x7, 0x40248, 0x9, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0x0, 0x5}, 0x201, 0x0, 0x8, 0x7, 0x7, 0x8, 0x101, 0x0, 0x80, 0x0, 0x400}, 0x0, 0x3, 0xffffffffffffffff, 0x8) (async) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x80, 0x1f, 0x6, 0x0, 0x80000001, 0x80040, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000200), 0x4}, 0x59898adfca0c9a83, 0x8, 0x3d8, 0x1, 0xaf, 0x80000000, 0x8, 0x0, 0x7, 0x0, 0x1}, 0x0, 0x7, 0xffffffffffffffff, 0x0) (async) preadv(r6, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r6, 0xd000941e, &(0x7f0000001600)={0x0, "48006cf0a81704e3c7c90110455edcd5"}) perf_event_open(&(0x7f0000000100)={0x7, 0x80, 0x5a, 0x5, 0x2, 0x1, 0x0, 0x7, 0x40248, 0x9, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0x0, 0x5}, 0x201, 0x0, 0x8, 0x7, 0x7, 0x8, 0x101, 0x0, 0x80, 0x0, 0x400}, r5, 0x3, r6, 0x8) (async) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x7, 0x34, 0xff, 0x0, 0x0, 0x5, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x4, 0x3}, 0x6d0, 0x3, 0x6, 0x9, 0xffff, 0x38000, 0x3, 0x0, 0x6, 0x0, 0x2}, r5, 0xffffffffffffffff, r1, 0x0) (async) fanotify_init(0x10, 0x101000) 13:10:01 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0xf0ff7f00000000}, 0x0) 13:10:01 executing program 3: ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x2, 0x3}, 0x4) 13:10:01 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_timeval(r0, 0x1, 0x21, &(0x7f00000000c0)={0x0, 0xea60}, 0x10) 13:10:01 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x0, 0x2081) socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) write$FUSE_OPEN(r0, &(0x7f00000000c0)={0x20}, 0x20) [ 892.871862] syz_tun: This device is already a HSR slave. 13:10:01 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:10:01 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000080)={0x8, 0x340, {0x0}, {0xee00}, 0x8000000000000000, 0x8}) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x8, 0x6, 0x3, 0x1, 0x0, 0x1, 0x20000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0xdd, 0xa309}, 0x36042, 0x76a, 0x3, 0x7, 0xfffffffffffffffe, 0x9d, 0xfffc, 0x0, 0x400, 0x0, 0x10000}, r0, 0x6, 0xffffffffffffffff, 0x0) 13:10:01 executing program 3: clock_adjtime(0x5, &(0x7f0000000080)) 13:10:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0) 13:10:01 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_EMULATED_HOST(r0, 0x2271, &(0x7f0000000000)) 13:10:01 executing program 0: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000080), 0x8, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000001440)={0x0, 0x0, "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", "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"}) readv(r0, &(0x7f0000001400)=[{&(0x7f00000000c0)=""/165, 0xa5}], 0x300) [ 893.093668] syz_tun: This device is already a HSR slave. 13:10:01 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:10:01 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0x40383d03, 0x0) 13:10:01 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x8, &(0x7f0000000280), 0x4) 13:10:01 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000280)={0x53, 0x0, 0x6, 0x7e, @buffer={0x0, 0x0, 0x0}, &(0x7f00000000c0)="03f40bd1300f", 0x0, 0x0, 0x0, 0x0, 0x0}) 13:10:01 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000080)={0x8, 0x340, {0x0}, {0xee00}, 0x8000000000000000, 0x8}) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x8, 0x6, 0x3, 0x1, 0x0, 0x1, 0x20000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0xdd, 0xa309}, 0x36042, 0x76a, 0x3, 0x7, 0xfffffffffffffffe, 0x9d, 0xfffc, 0x0, 0x400, 0x0, 0x10000}, r0, 0x6, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000080)={0x8, 0x340, {}, {0xee00}, 0x8000000000000000, 0x8}) (async) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x8, 0x6, 0x3, 0x1, 0x0, 0x1, 0x20000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0xdd, 0xa309}, 0x36042, 0x76a, 0x3, 0x7, 0xfffffffffffffffe, 0x9d, 0xfffc, 0x0, 0x400, 0x0, 0x10000}, r0, 0x6, 0xffffffffffffffff, 0x0) (async) 13:10:01 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000000c0)=ANY=[@ANYBLOB="e0000001ac1414"], 0x34) 13:10:01 executing program 3: capset(&(0x7f00000003c0)={0x19980330}, &(0x7f0000000400)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 13:10:01 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000080), 0x8, 0x0) io_setup(0x2, &(0x7f0000001600)=0x0) io_submit(r1, 0x1, &(0x7f0000003100)=[&(0x7f0000000000)={0x0, 0x0, 0x2, 0x0, 0x0, r0, 0x0}]) [ 893.403384] syz_tun: This device is already a HSR slave. 13:10:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, 0x0, 0x0) bind$netlink(r0, &(0x7f0000000000), 0xc) 13:10:01 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x6}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:10:01 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000080)={0x8, 0x340, {0x0}, {0xee00}, 0x8000000000000000, 0x8}) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x8, 0x6, 0x3, 0x1, 0x0, 0x1, 0x20000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0xdd, 0xa309}, 0x36042, 0x76a, 0x3, 0x7, 0xfffffffffffffffe, 0x9d, 0xfffc, 0x0, 0x400, 0x0, 0x10000}, r0, 0x6, 0xffffffffffffffff, 0x0) 13:10:01 executing program 0: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000080), 0x8, 0x0) io_setup(0x2, &(0x7f0000001600)=0x0) io_submit(r1, 0x1, &(0x7f0000003100)=[&(0x7f0000000000)={0x0, 0x0, 0x2000000, 0x0, 0x0, r0, 0x0}]) 13:10:01 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000023c0)='loginuid\x00') read$FUSE(r0, 0x0, 0x0) 13:10:01 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000340), 0x0, 0x42) ioctl$BLKZEROOUT(r0, 0x127f, 0x0) 13:10:01 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2286, 0x0) [ 893.707358] syz_tun: This device is already a HSR slave. 13:10:01 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x20000000, 0xffffffffffffffff, 0x0) r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x4400, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x1d, 0xff, 0x1, 0x1, 0x0, 0x1, 0x1000, 0xd, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x2001, 0x5, 0xfff, 0x8, 0x7, 0x1ff, 0x800, 0x0, 0x400, 0x0, 0x72}, 0xffffffffffffffff, 0x2, r0, 0xa) r1 = perf_event_open(&(0x7f0000000680)={0x1, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80045, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NFULNL_MSG_CONFIG(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000000)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x84) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r3, &(0x7f0000000640)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000005c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES64=r3, @ANYRES16=r2, @ANYRES32=0x0, @ANYRESDEC=r1, @ANYRES32, @ANYRES8, @ANYRES32=0x0, @ANYBLOB="080001000200000008001d00", @ANYRES32=r2, @ANYBLOB="730fca408a8504c01583f282a224df7e8448de241ebd0767d4162695e524f2d817b92adc1736696e2994cc4b39af3c40bbdfcc720e0adb074d14e46811eeec8c6616bae6659f742234693cf48e7067f773c59291ffffffffffffffff57552a5c8d53247f10a865eeb3d0a3fae23aef42ec4f6b0c01916b55dfbd3cf600000000"], 0x64}, 0x1, 0x0, 0x0, 0x4090}, 0x4004) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000000)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r4, 0x0) preadv(r4, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r4, 0xd000941e, &(0x7f0000001600)={0x0, "4800dcd500"}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r4) ioctl$PTP_SYS_OFFSET_EXTENDED(r2, 0xc4c03d09, &(0x7f0000000500)={0xa}) 13:10:02 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x7}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:10:02 executing program 0: syz_open_procfs(0x0, &(0x7f0000000240)='environ\x00') 13:10:02 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req={0x1000, 0x124b}, 0x10) 13:10:02 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000d80)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0xe, 0x1, '/dev/ptmx\x00'}]}, 0x2c}}, 0x0) 13:10:02 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000020c0)='net/tcp\x00') read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) 13:10:02 executing program 3: setresuid(0x0, 0xee01, 0xee00) openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000140), 0x1, 0x0) 13:10:02 executing program 2: msgget(0x0, 0x409) 13:10:02 executing program 0: setreuid(0xee01, 0xee00) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000080)={{0x3, 0xee01, 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) 13:10:02 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x8}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) [ 894.071813] syz_tun: This device is already a HSR slave. 13:10:02 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x68, &(0x7f0000000000)=0x7, 0x4) 13:10:02 executing program 3: setresuid(0xee01, 0xee00, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000240), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) [ 894.264257] syz_tun: This device is already a HSR slave. 13:10:02 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0xc0481273, 0x0) 13:10:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006a80)={0x0, 0x0, &(0x7f0000002900)=[{&(0x7f0000000280)={0x10}, 0x10}], 0x1, &(0x7f0000006a40)=[@cred={{0xf}}], 0x20}, 0x0) 13:10:02 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000180), 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) dup3(r0, r1, 0x0) 13:10:02 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="0e00000009000d00ffff000008000b008000000008000b0008000000060005003f060014060005002207000008000b00ffff000007000100667700006c0002001400030076657468300000000000000000000000140003006261746164765f736c6176655f3100001400030076657468305f766972745f77696669001400030070696d367265673100000000000000000800010002119371e63d351c42fc8a000700080001000500050008000500ffffff7f648150c4ceaa7dd1a0d0d475cf2ad4f3edd8ad2f40680663047205957135710a8568f4f2be375119aba03c6339236c72fcc387fa25a49b2caad6c4362b117c0cb1ab62d1266265173d5e81529e3038840fb985a64a3fc2e74e1c03b7168b9efdb16c2780d254b05444bb2e701aabbc2bf3e9f4ea99dc25aaa1b6b6593e8878ae7525beafd4a0b4fb32180c485a17dc8ba9409d4bece6d7f8512d9b996a912da234cace74de11499d7abe9606"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x9}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:10:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x20000000, 0xffffffffffffffff, 0x0) (async) r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x4400, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x1d, 0xff, 0x1, 0x1, 0x0, 0x1, 0x1000, 0xd, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x2001, 0x5, 0xfff, 0x8, 0x7, 0x1ff, 0x800, 0x0, 0x400, 0x0, 0x72}, 0xffffffffffffffff, 0x2, r0, 0xa) r1 = perf_event_open(&(0x7f0000000680)={0x1, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80045, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) (async) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NFULNL_MSG_CONFIG(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000000)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x84) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r3, &(0x7f0000000640)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000005c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES64=r3, @ANYRES16=r2, @ANYRES32=0x0, @ANYRESDEC=r1, @ANYRES32, @ANYRES8, @ANYRES32=0x0, @ANYBLOB="080001000200000008001d00", @ANYRES32=r2, @ANYBLOB="730fca408a8504c01583f282a224df7e8448de241ebd0767d4162695e524f2d817b92adc1736696e2994cc4b39af3c40bbdfcc720e0adb074d14e46811eeec8c6616bae6659f742234693cf48e7067f773c59291ffffffffffffffff57552a5c8d53247f10a865eeb3d0a3fae23aef42ec4f6b0c01916b55dfbd3cf600000000"], 0x64}, 0x1, 0x0, 0x0, 0x4090}, 0x4004) (async) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000000)=ANY=[], 0x208e24b) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r4, 0x0) (async) preadv(r4, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) (async) ioctl$BTRFS_IOC_DEV_INFO(r4, 0xd000941e, &(0x7f0000001600)={0x0, "4800dcd500"}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r4) (async) ioctl$PTP_SYS_OFFSET_EXTENDED(r2, 0xc4c03d09, &(0x7f0000000500)={0xa}) 13:10:02 executing program 3: socketpair(0x11, 0x3, 0x300, &(0x7f0000000140)) 13:10:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000000)=0x23, 0x4) 13:10:03 executing program 1: syz_clone(0x80041000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000004400)="e4") 13:10:03 executing program 3: read$FUSE(0xffffffffffffffff, 0x0, 0x0) ioprio_set$uid(0x3, 0x0, 0x2007) 13:10:03 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000000)={@multicast2, @local, 0x1}, 0x10) [ 894.978048] syz_tun: This device is already a HSR slave. 13:10:03 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0xa}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:10:03 executing program 2: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000004a00)=[{0x0, 0x0, 0x1000}], 0x1) r1 = semget$private(0x0, 0x3, 0x0) semtimedop(r1, &(0x7f0000000140)=[{0x0, 0x0, 0x1000}], 0x1, 0x0) 13:10:03 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x0, 0x3, 0x101}, 0x14}}, 0x0) 13:10:03 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0xf0ffffff7f0000) 13:10:03 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000180), r0) sendmsg$NLBL_MGMT_C_VERSION(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x24, r2, 0x1, 0x0, 0x0, {0x2}, [@NLBL_MGMT_A_DOMAIN={0xe, 0x1, 'NLBL_MGMT\x00'}]}, 0x24}}, 0x0) 13:10:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000140)="eb", 0x1}], 0x1}, 0x0) clock_gettime(0x0, &(0x7f00000032c0)={0x0, 0x0}) recvmmsg$unix(r1, &(0x7f0000003200)=[{{&(0x7f0000000080), 0x6e, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x10022, &(0x7f0000003300)={0x0, r2+60000000}) [ 895.341887] syz_tun: This device is already a HSR slave. 13:10:03 executing program 1: syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x80800) 13:10:03 executing program 3: semctl$SEM_STAT_ANY(0x0, 0x0, 0x14, &(0x7f0000000200)=""/254) 13:10:03 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)={0x40, 0x0, 0x0, 0x0, 0x0, {0x2}, [@NLBL_MGMT_A_DOMAIN={0xe, 0x1, 'NLBL_MGMT\x00'}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @dev}, @NLBL_MGMT_A_IPV4MASK={0x0, 0x8, @dev}]}, 0xffffffffffffffa7}}, 0x0) 13:10:03 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x20000000, 0xffffffffffffffff, 0x0) (async) r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x4400, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x1d, 0xff, 0x1, 0x1, 0x0, 0x1, 0x1000, 0xd, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x2001, 0x5, 0xfff, 0x8, 0x7, 0x1ff, 0x800, 0x0, 0x400, 0x0, 0x72}, 0xffffffffffffffff, 0x2, r0, 0xa) r1 = perf_event_open(&(0x7f0000000680)={0x1, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80045, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NFULNL_MSG_CONFIG(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000000)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x84) (async) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r3, &(0x7f0000000640)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000005c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES64=r3, @ANYRES16=r2, @ANYRES32=0x0, @ANYRESDEC=r1, @ANYRES32, @ANYRES8, @ANYRES32=0x0, @ANYBLOB="080001000200000008001d00", @ANYRES32=r2, @ANYBLOB="730fca408a8504c01583f282a224df7e8448de241ebd0767d4162695e524f2d817b92adc1736696e2994cc4b39af3c40bbdfcc720e0adb074d14e46811eeec8c6616bae6659f742234693cf48e7067f773c59291ffffffffffffffff57552a5c8d53247f10a865eeb3d0a3fae23aef42ec4f6b0c01916b55dfbd3cf600000000"], 0x64}, 0x1, 0x0, 0x0, 0x4090}, 0x4004) (async) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000000)=ANY=[], 0x208e24b) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r4, 0x0) preadv(r4, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) (async) ioctl$BTRFS_IOC_DEV_INFO(r4, 0xd000941e, &(0x7f0000001600)={0x0, "4800dcd500"}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r4) ioctl$PTP_SYS_OFFSET_EXTENDED(r2, 0xc4c03d09, &(0x7f0000000500)={0xa}) 13:10:03 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000180), r0) sendmsg$NLBL_MGMT_C_VERSION(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x2c, r2, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_DOMAIN={0xe, 0x1, 'NLBL_MGMT\x00'}, @NLBL_MGMT_A_IPV4MASK={0x4, 0x8, @multicast2}]}, 0x2c}}, 0x0) 13:10:03 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0xb}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:10:04 executing program 3: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f0000000000)) 13:10:04 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2287, 0x0) 13:10:04 executing program 2: io_setup(0x2, &(0x7f0000001600)) io_setup(0x9, &(0x7f0000000400)) io_setup(0x6, &(0x7f0000000140)=0x0) io_destroy(r0) 13:10:04 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000000)={@multicast2, @local, 0x1, 0x1, [@loopback]}, 0x14) [ 895.982470] syz_tun: This device is already a HSR slave. 13:10:04 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="0e00000009000d00ffff000008000b008000000008000b0008000000060005003f060014060005002207000008000b00ffff000007000100667700006c0002001400030076657468300000000000000000000000140003006261746164765f736c6176655f3100001400030076657468305f766972745f77696669001400030070696d367265673100000000000000000800010002119371e63d351c42fc8a000700080001000500050008000500ffffff7f648150c4ceaa7dd1a0d0d475cf2ad4f3edd8ad2f40680663047205957135710a8568f4f2be375119aba03c6339236c72fcc387fa25a49b2caad6c4362b117c0cb1ab62d1266265173d5e81529e3038840fb985a64a3fc2e74e1c03b7168b9efdb16c2780d254b05444bb2e701aabbc2bf3e9f4ea99dc25aaa1b6b6593e8878ae7525beafd4a0b4fb32180c485a17dc8ba9409d4bece6d7f8512d9b996a912da234cace74de11499d7abe9606"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0xc}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:10:04 executing program 1: semop(0x0, &(0x7f0000004a00)=[{}, {}, {}], 0x2aaaaaaaaaaaadb2) 13:10:04 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f00000000c0)) [ 896.162825] IPVS: ftp: loaded support on port[0] = 21 13:10:04 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000180), 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) [ 896.235962] syz_tun: This device is already a HSR slave. 13:10:04 executing program 5: utimensat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={{0x77359400}}, 0x100) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:10:04 executing program 1: setresuid(0xee01, 0xee00, 0x0) r0 = getuid() setfsuid(r0) r1 = geteuid() setresuid(r1, r0, 0x0) 13:10:04 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0xe}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:10:04 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006a80)={0x0, 0x0, &(0x7f0000002900)=[{&(0x7f0000000280)={0x10}, 0x10}], 0xd, &(0x7f0000006a40)=[@cred={{0x1c, 0x1, 0xd}}], 0x20}, 0x0) 13:10:04 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000081c0)='net/stat\x00') inotify_add_watch(r0, 0x0, 0x30000200) 13:10:04 executing program 2: syz_open_dev$sg(&(0x7f0000000080), 0x8000, 0x4200) 13:10:05 executing program 3: syz_clone(0x44a00000, &(0x7f0000000040), 0x0, 0x0, 0x0, &(0x7f0000000140)="6c47d79dfc663ea0da0c7355a2cf1c120c7e2f53d38d939919b64648a84e4b065c047ada1cf7dd2483bb428466745bfdec40204e05551c039c339c4e013ec6a0b56f4710a6f5e8e3282755f2e632a0242a205c59dbc2b3c51e77315fe071462c") signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) io_setup(0x2, &(0x7f0000001600)) syz_genetlink_get_family_id$nfc(&(0x7f0000000340), 0xffffffffffffffff) io_getevents(0x0, 0x2, 0x0, 0x0, &(0x7f0000000300)={0x77359400}) io_submit(0x0, 0x0, &(0x7f0000003100)) 13:10:05 executing program 5: utimensat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={{0x77359400}}, 0x100) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={{0x77359400}}, 0x100) (async) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) 13:10:05 executing program 0: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$nfc(&(0x7f0000000340), 0xffffffffffffffff) io_getevents(0x0, 0x2, 0x1, &(0x7f0000000240)=[{}], 0x0) 13:10:05 executing program 2: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000004a00)=[{}, {0x3, 0x1}, {0x3, 0xd402}], 0x3) 13:10:05 executing program 1: mq_open(&(0x7f0000000100)='sit0\x00', 0x40, 0x0, &(0x7f0000000140)) [ 896.962808] syz_tun: This device is already a HSR slave. 13:10:05 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x10}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:10:05 executing program 1: r0 = eventfd(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) read$FUSE(r1, 0x0, 0x0) 13:10:05 executing program 0: io_setup(0x2, &(0x7f0000001600)=0x0) io_submit(r0, 0x1, &(0x7f0000003100)) 13:10:05 executing program 1: socketpair(0x3f, 0x0, 0x0, &(0x7f0000000180)) 13:10:05 executing program 5: utimensat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={{0x77359400}}, 0x100) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 64) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (rerun: 64) [ 897.235437] IPVS: ftp: loaded support on port[0] = 21 [ 897.271413] syz_tun: This device is already a HSR slave. 13:10:05 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x48}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:10:05 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000940), 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x80081272, 0x0) 13:10:05 executing program 3: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000200)) 13:10:05 executing program 1: sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, 0x0, 0x9effffff) 13:10:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vim2m(&(0x7f0000000000), 0x3, 0x2) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000040)) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 897.554864] syz_tun: This device is already a HSR slave. 13:10:06 executing program 2: keyctl$get_persistent(0x16, 0x0, 0xfffffffffffffff9) 13:10:06 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000940), 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x1260, 0x0) 13:10:06 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4c}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:10:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32) r0 = syz_open_dev$vim2m(&(0x7f0000000000), 0x3, 0x2) (rerun: 32) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000040)) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:10:06 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x10, 0x4, 0x0, 0x8, 0x0, 0x1}, 0x48) 13:10:06 executing program 3: add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) 13:10:06 executing program 0: bpf$MAP_CREATE(0x11, &(0x7f0000000140)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 13:10:06 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x44040, 0x0) 13:10:06 executing program 2: pipe(&(0x7f00000003c0)={0xffffffffffffffff}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x2000)=nil, 0x930, 0x0, 0x12, r0, 0x0) 13:10:06 executing program 1: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, r0) [ 898.232908] syz_tun: This device is already a HSR slave. 13:10:06 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x60}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:10:06 executing program 2: socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000001300), 0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000001800), 0xc000, 0x0) 13:10:06 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000340), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$search(0xa, r1, &(0x7f0000000100)='ceph\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0) 13:10:06 executing program 3: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x6, r0, 0x0, 0x0) 13:10:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vim2m(&(0x7f0000000000), 0x3, 0x2) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000040)) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:10:06 executing program 1: keyctl$restrict_keyring(0x4, 0x0, 0x0, 0x0) 13:10:06 executing program 2: bpf$MAP_CREATE(0x10, &(0x7f0000000040)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) [ 898.562875] syz_tun: This device is already a HSR slave. 13:10:06 executing program 0: syz_open_dev$loop(&(0x7f0000000940), 0x0, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) 13:10:06 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x68}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:10:06 executing program 1: msgsnd(0x0, &(0x7f0000000280), 0x8, 0x0) 13:10:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0xd6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc8600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x9a, 0x1, 0x9, 0x80, 0x0, 0xffffffff80000001, 0x80000, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x10a30, 0x6, 0x5, 0x9, 0x1f, 0x2, 0x7, 0x0, 0x5e7, 0x0, 0x8}, 0x0, 0x8, r0, 0x1) 13:10:06 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000940), 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x127d, 0x0) 13:10:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xffffff1f}, 0x0) 13:10:07 executing program 0: r0 = socket(0x2, 0x3, 0x2) sendmsg$TIPC_NL_LINK_SET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}}, 0x4081) 13:10:07 executing program 1: keyctl$restrict_keyring(0x9, 0x0, 0x0, 0x0) 13:10:07 executing program 3: socketpair(0x10, 0x0, 0x0, &(0x7f00000011c0)) 13:10:07 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0xd6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc8600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x9a, 0x1, 0x9, 0x80, 0x0, 0xffffffff80000001, 0x80000, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x10a30, 0x6, 0x5, 0x9, 0x1f, 0x2, 0x7, 0x0, 0x5e7, 0x0, 0x8}, 0x0, 0x8, r0, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0xd6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc8600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x9a, 0x1, 0x9, 0x80, 0x0, 0xffffffff80000001, 0x80000, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x10a30, 0x6, 0x5, 0x9, 0x1f, 0x2, 0x7, 0x0, 0x5e7, 0x0, 0x8}, 0x0, 0x8, r0, 0x1) (async) [ 898.876202] syz_tun: This device is already a HSR slave. 13:10:07 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x6c}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:10:07 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000940), 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x4c0a, &(0x7f0000000000)={r0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "1867c90e92ea8ded94b166b17f0b2358d1249e4bfbce68766b3e943c2762e5f7330274eda88c22b6e84664183454cde11ead6759a34ccee4ad8c6619dd462446", "09405880263272c8b4351e8d2b89a7813e6c798a6f6883f252518a18857e0c6370e3f6285695ac4650e72343a72dd5b9dd6f11ec255839905ddebe045f425110", "6d1e8ab3dde5763b98c198d5f52602ee6e8d44c10bbbf183c25c0aa56ae01950"}}) 13:10:07 executing program 2: syz_emit_ethernet(0x5a, &(0x7f0000000500)=ANY=[], 0x0) 13:10:07 executing program 0: r0 = socket(0x2, 0x3, 0x2) syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000001c0)={'sit0\x00', &(0x7f00000000c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}}}}) 13:10:07 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0xd6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc8600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x9a, 0x1, 0x9, 0x80, 0x0, 0xffffffff80000001, 0x80000, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x10a30, 0x6, 0x5, 0x9, 0x1f, 0x2, 0x7, 0x0, 0x5e7, 0x0, 0x8}, 0x0, 0x8, r0, 0x1) 13:10:07 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_FS_INFO(r0, 0x8400941f, 0x0) 13:10:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0xc001) 13:10:07 executing program 1: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={0x0, 0x0, 0x18}, 0x10) 13:10:07 executing program 0: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x10, r0, 0x0, 0x0) 13:10:07 executing program 5: ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000000)=ANY=[@ANYBLOB="0100"/12, @ANYRES32=0xffffffffffffffff, @ANYBLOB="04000000000000002e2f66696c653000"]) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2000000000000000, r0, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000680)={0x1, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80045, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NFULNL_MSG_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000000)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x84) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000640)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000005c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES64=r4, @ANYRES16=r3, @ANYRES32=0x0, @ANYRESDEC=r2, @ANYRES32, @ANYRES8, @ANYRES32=0x0, @ANYBLOB="080001000200000008001d00", @ANYRES32=r3, @ANYBLOB="730fca408a8504c01583f282a224df7e8448de241ebd0767d4162695e524f2d817b92adc1736696e2994cc4b39af3c40bbdfcc720e0adb074d14e46811eeec8c6616bae6659f742234693cf48e7067f773c59291ffffffffffffffff57552a5c8d53247f10a865eeb3d0a3fae23aef42ec4f6b0c01916b55dfbd3cf600000000"], 0x64}, 0x1, 0x0, 0x0, 0x4090}, 0x4004) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000000)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r5, 0x0) preadv(r5, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r5, 0xd000941e, &(0x7f0000001600)={0x0, "4800dcd500"}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x20, 0x8, 0x8, 0xff, 0x0, 0x8001, 0x8100, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xc6, 0x1, @perf_config_ext={0x1ff, 0x40}, 0x19, 0xd547, 0x81, 0x0, 0x8, 0xfffffff7, 0x99, 0x0, 0x2, 0x0, 0x4}, r5, 0x2, r1, 0x1) [ 899.245808] syz_tun: This device is already a HSR slave. 13:10:07 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$BTRFS_IOC_FS_INFO(r0, 0x8400941f, 0x0) 13:10:07 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x74}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:10:07 executing program 2: keyctl$restrict_keyring(0x5, 0x0, 0x0, 0x0) 13:10:07 executing program 1: getresuid(&(0x7f00000002c0), 0x0, 0x0) 13:10:07 executing program 0: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001a80)={0xffffffffffffffff, 0x0}, 0x20) 13:10:07 executing program 3: bpf$BPF_PROG_DETACH(0x14, 0x0, 0x0) 13:10:07 executing program 2: pipe(&(0x7f00000003c0)={0xffffffffffffffff}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x1000)=nil, 0x930, 0x300000b, 0x10, r0, 0x0) 13:10:07 executing program 1: bpf$MAP_CREATE(0x10, &(0x7f0000000140)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) [ 899.622786] syz_tun: This device is already a HSR slave. 13:10:07 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x7a}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:10:07 executing program 0: bpf$MAP_CREATE(0x1c, &(0x7f0000000140)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 13:10:07 executing program 3: r0 = socket(0x28, 0x1, 0x0) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) [ 899.900015] syz_tun: This device is already a HSR slave. 13:10:08 executing program 5: ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000000)=ANY=[@ANYBLOB="0100"/12, @ANYRES32=0xffffffffffffffff, @ANYBLOB="04000000000000002e2f66696c653000"]) (async) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2000000000000000, r0, 0x0) (async, rerun: 32) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (rerun: 32) r2 = perf_event_open(&(0x7f0000000680)={0x1, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80045, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) (async, rerun: 64) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 64) sendmsg$NFULNL_MSG_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000000)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x84) (async, rerun: 64) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (rerun: 64) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000640)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000005c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES64=r4, @ANYRES16=r3, @ANYRES32=0x0, @ANYRESDEC=r2, @ANYRES32, @ANYRES8, @ANYRES32=0x0, @ANYBLOB="080001000200000008001d00", @ANYRES32=r3, @ANYBLOB="730fca408a8504c01583f282a224df7e8448de241ebd0767d4162695e524f2d817b92adc1736696e2994cc4b39af3c40bbdfcc720e0adb074d14e46811eeec8c6616bae6659f742234693cf48e7067f773c59291ffffffffffffffff57552a5c8d53247f10a865eeb3d0a3fae23aef42ec4f6b0c01916b55dfbd3cf600000000"], 0x64}, 0x1, 0x0, 0x0, 0x4090}, 0x4004) (async) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000000)=ANY=[], 0x208e24b) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r5, 0x0) preadv(r5, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) (async) ioctl$BTRFS_IOC_DEV_INFO(r5, 0xd000941e, &(0x7f0000001600)={0x0, "4800dcd500"}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) (async, rerun: 64) perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x20, 0x8, 0x8, 0xff, 0x0, 0x8001, 0x8100, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xc6, 0x1, @perf_config_ext={0x1ff, 0x40}, 0x19, 0xd547, 0x81, 0x0, 0x8, 0xfffffff7, 0x99, 0x0, 0x2, 0x0, 0x4}, r5, 0x2, r1, 0x1) (rerun: 64) 13:10:08 executing program 2: add_key(&(0x7f0000000480)='rxrpc_s\x00', 0x0, &(0x7f0000000500)="a3", 0x1, 0xfffffffffffffffb) 13:10:08 executing program 1: bpf$MAP_CREATE(0x4, &(0x7f0000000040)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 13:10:08 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 13:10:08 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @dev}}}}) 13:10:08 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5}, @IFLA_HSR_SLAVE2={0x2, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:10:08 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 13:10:08 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000000c0), 0x0, 0x0, 0x2) 13:10:08 executing program 0: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, 0x0, 0x0) keyctl$link(0x8, r0, r0) 13:10:08 executing program 2: bpf$MAP_CREATE(0xd, &(0x7f0000000140)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) [ 900.415268] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.4'. [ 900.449903] (unnamed net_device) (uninitialized): HSR: Slave1 device not specified 13:10:08 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5}, @IFLA_HSR_SLAVE2={0x3, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:10:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000380)={&(0x7f0000000200), 0x2000020c, &(0x7f0000000340)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) [ 900.670408] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.4'. [ 900.715052] (unnamed net_device) (uninitialized): HSR: Slave1 device not specified 13:10:09 executing program 5: ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000000)=ANY=[@ANYBLOB="0100"/12, @ANYRES32=0xffffffffffffffff, @ANYBLOB="04000000000000002e2f66696c653000"]) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2000000000000000, r0, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000680)={0x1, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80045, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NFULNL_MSG_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000000)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x84) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000640)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000005c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES64=r4, @ANYRES16=r3, @ANYRES32=0x0, @ANYRESDEC=r2, @ANYRES32, @ANYRES8, @ANYRES32=0x0, @ANYBLOB="080001000200000008001d00", @ANYRES32=r3, @ANYBLOB="730fca408a8504c01583f282a224df7e8448de241ebd0767d4162695e524f2d817b92adc1736696e2994cc4b39af3c40bbdfcc720e0adb074d14e46811eeec8c6616bae6659f742234693cf48e7067f773c59291ffffffffffffffff57552a5c8d53247f10a865eeb3d0a3fae23aef42ec4f6b0c01916b55dfbd3cf600000000"], 0x64}, 0x1, 0x0, 0x0, 0x4090}, 0x4004) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000000)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r5, 0x0) preadv(r5, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r5, 0xd000941e, &(0x7f0000001600)={0x0, "4800dcd500"}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x20, 0x8, 0x8, 0xff, 0x0, 0x8001, 0x8100, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xc6, 0x1, @perf_config_ext={0x1ff, 0x40}, 0x19, 0xd547, 0x81, 0x0, 0x8, 0xfffffff7, 0x99, 0x0, 0x2, 0x0, 0x4}, r5, 0x2, r1, 0x1) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000000)=ANY=[@ANYBLOB="0100"/12, @ANYRES32, @ANYBLOB="04000000000000002e2f66696c653000"]) (async) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2000000000000000, r0, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000680)={0x1, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80045, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) (async) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) (async) pipe(&(0x7f0000000480)) (async) sendmsg$NFULNL_MSG_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000000)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x84) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000640)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000005c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES64=r4, @ANYRES16=r3, @ANYRES32=0x0, @ANYRESDEC=r2, @ANYRES32, @ANYRES8, @ANYRES32=0x0, @ANYBLOB="080001000200000008001d00", @ANYRES32=r3, @ANYBLOB="730fca408a8504c01583f282a224df7e8448de241ebd0767d4162695e524f2d817b92adc1736696e2994cc4b39af3c40bbdfcc720e0adb074d14e46811eeec8c6616bae6659f742234693cf48e7067f773c59291ffffffffffffffff57552a5c8d53247f10a865eeb3d0a3fae23aef42ec4f6b0c01916b55dfbd3cf600000000"], 0x64}, 0x1, 0x0, 0x0, 0x4090}, 0x4004) (async) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.current\x00', 0x275a, 0x0) (async) write$binfmt_script(r5, &(0x7f0000000000)=ANY=[], 0x208e24b) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r5, 0x0) (async) preadv(r5, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) (async) ioctl$BTRFS_IOC_DEV_INFO(r5, 0xd000941e, &(0x7f0000001600)={0x0, "4800dcd500"}) (async) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) (async) perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x20, 0x8, 0x8, 0xff, 0x0, 0x8001, 0x8100, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xc6, 0x1, @perf_config_ext={0x1ff, 0x40}, 0x19, 0xd547, 0x81, 0x0, 0x8, 0xfffffff7, 0x99, 0x0, 0x2, 0x0, 0x4}, r5, 0x2, r1, 0x1) (async) 13:10:09 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000940), 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x125d, 0x0) 13:10:09 executing program 1: syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x410400) 13:10:09 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000380)={&(0x7f0000000200), 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x14}, 0xfffffdef}}, 0x0) 13:10:09 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="0e00000009000d00ffff000008000b008000000008000b0008000000060005003f060014060005002207000008000b00ffff000007000100667700006c0002001400030076657468300000000000000000000000140003006261746164765f736c6176655f3100001400030076657468305f766972745f77696669001400030070696d367265673100000000000000000800010002119371e63d351c42fc8a000700080001000500050008000500ffffff7f648150c4ceaa7dd1a0d0d475cf2ad4f3edd8ad2f40680663047205957135710a8568f4f2be375119aba03c6339236c72fcc387fa25a49b2caad6c4362b117c0cb1ab62d1266265173d5e81529e3038840fb985a64a3fc2e74e1c03b7168b9efdb16c2780d254b05444bb2e701aabbc2bf3e9f4ea99dc25aaa1b6b6593e8878ae7525beafd4a0b4fb32180c485a17dc8ba9409d4bece6d7f8512d9b996a912da234cace74de11499d7abe9606"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5}, @IFLA_HSR_SLAVE2={0x5, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:10:09 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000940), 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x0, 0x0, 0x98, &(0x7f0000000000)={0x0, 0x0, 0xe}}) 13:10:09 executing program 3: syz_open_dev$loop(&(0x7f0000000940), 0x0, 0x4c43) 13:10:09 executing program 2: r0 = socket(0x28, 0x1, 0x0) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c805) 13:10:09 executing program 1: bpf$OBJ_GET_MAP(0x7, &(0x7f00000008c0)={&(0x7f0000000880)='./file0\x00'}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00'}, 0x10) 13:10:09 executing program 0: r0 = socket(0x2, 0x3, 0x2) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, 0x0, 0x0) [ 901.423437] validate_nla: 2 callbacks suppressed [ 901.423447] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 13:10:09 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5}, @IFLA_HSR_SLAVE2={0x6, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:10:09 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f0000000100), 0x4) [ 901.620080] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 13:10:10 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0xf0c, 0x70bd27, 0x25dfdbff, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4050}, 0x8000) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:10:10 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000940), 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x301, 0x0) 13:10:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x4, 0x954}]}]}}, &(0x7f0000000240)=""/160, 0x32, 0xa0, 0x1}, 0x20) 13:10:10 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 13:10:10 executing program 2: socket$inet(0x2, 0x300, 0x0) 13:10:10 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5}, @IFLA_HSR_SLAVE2={0x7, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:10:10 executing program 2: syz_open_dev$loop(&(0x7f0000000940), 0x0, 0x26900) 13:10:10 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TRIM(r0, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001480)={0x33fe0}, 0x33fe0}}, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x28, 0x3f7, 0x0, 0x0, 0x0, {0x7, 0x7, './file0', './file0'}}, 0x28}}, 0x0) 13:10:10 executing program 1: memfd_create(&(0x7f0000000000)='-\x00', 0x4) 13:10:10 executing program 3: r0 = socket(0x2, 0x3, 0x2) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000140)={'sit0\x00', &(0x7f0000000000)={'tunl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @empty}}}}) 13:10:10 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000940), 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x1267, 0x0) 13:10:10 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0xf0c, 0x70bd27, 0x25dfdbff, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4050}, 0x8000) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 902.318068] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 13:10:10 executing program 1: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$clear(0x7, r0) 13:10:10 executing program 2: pipe(&(0x7f00000003c0)={0xffffffffffffffff}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x4000)=nil, 0x930, 0x0, 0x26011, r0, 0x0) 13:10:10 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000940), 0x0, 0x0) r1 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x4c0a, &(0x7f0000000040)={r1, 0x10000101, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5792c21e87338e13c4133ecd546497d9854875c1a4f5afa1e2a401c708dd161eba5ff9355e691af855dead5c7aca2e92d120b4d66a337cadf15dee53c99cb0aa", "2edb1079abfc52521dfd96876d1d00e4a98f23b2665f8b1749a9f4b6ffdffbe82915081874832bd09f90087e0f3cc7e2532ca3455a5e61b9ee7e4e941a2d740a", "d3fa4eb72b68b0cff20a0b19bc2a30906f9950d17392454d00"}}) 13:10:10 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="0e00000009000d00ffff000008000b008000000008000b0008000000060005003f060014060005002207000008000b00ffff000007000100667700006c0002001400030076657468300000000000000000000000140003006261746164765f736c6176655f3100001400030076657468305f766972745f77696669001400030070696d367265673100000000000000000800010002119371e63d351c42fc8a000700080001000500050008000500ffffff7f648150c4ceaa7dd1a0d0d475cf2ad4f3edd8ad2f40680663047205957135710a8568f4f2be375119aba03c6339236c72fcc387fa25a49b2caad6c4362b117c0cb1ab62d1266265173d5e81529e3038840fb985a64a3fc2e74e1c03b7168b9efdb16c2780d254b05444bb2e701aabbc2bf3e9f4ea99dc25aaa1b6b6593e8878ae7525beafd4a0b4fb32180c485a17dc8ba9409d4bece6d7f8512d9b996a912da234cace74de11499d7abe9606"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5}, @IFLA_HSR_SLAVE2={0x9, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:10:10 executing program 0: getresuid(&(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 13:10:10 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0xf0c, 0x70bd27, 0x25dfdbff, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4050}, 0x8000) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0xf0c, 0x70bd27, 0x25dfdbff, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4050}, 0x8000) (async) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) 13:10:10 executing program 1: mmap$KVM_VCPU(&(0x7f0000ffc000/0x4000)=nil, 0x930, 0x100000c, 0x18f030, 0xffffffffffffffff, 0x0) 13:10:10 executing program 2: keyctl$restrict_keyring(0x3, 0xfffffffffffffffe, 0x0, 0x0) [ 902.482391] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 13:10:10 executing program 3: bpf$MAP_CREATE(0x4, &(0x7f0000000140)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 13:10:10 executing program 0: setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) 13:10:10 executing program 1: add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) 13:10:10 executing program 2: r0 = timerfd_create(0x8, 0x0) timerfd_gettime(r0, &(0x7f0000000300)) 13:10:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x3f, 0x84, 0x1, 0x40, 0x0, 0x3, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x4, @perf_config_ext={0x7, 0xfffffffffffffff7}, 0x80004, 0xfff, 0x1c90, 0xe7cb6d647dc9d795, 0x6, 0x8001, 0x1, 0x0, 0x7fff, 0x0, 0x1}, 0x0, 0x8, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 902.525434] (unnamed net_device) (uninitialized): HSR: Slave1 device not specified 13:10:10 executing program 0: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x11, r0, 0x0, 0x0) 13:10:10 executing program 3: add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, r0) 13:10:10 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5}, @IFLA_HSR_SLAVE2={0xa, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:10:10 executing program 2: socket$inet(0x2, 0x1, 0x101) 13:10:10 executing program 1: keyctl$restrict_keyring(0xc, 0x0, 0x0, 0x0) 13:10:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 64) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x3f, 0x84, 0x1, 0x40, 0x0, 0x3, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x4, @perf_config_ext={0x7, 0xfffffffffffffff7}, 0x80004, 0xfff, 0x1c90, 0xe7cb6d647dc9d795, 0x6, 0x8001, 0x1, 0x0, 0x7fff, 0x0, 0x1}, 0x0, 0x8, 0xffffffffffffffff, 0x0) (rerun: 64) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:10:10 executing program 0: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000000)='logon\x00', 0x0) 13:10:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [""]}, 0x1c}}, 0x0) 13:10:10 executing program 3: keyctl$restrict_keyring(0x14, 0x0, 0x0, 0x0) 13:10:10 executing program 1: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f0000000040)='id_resolver\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)="c6", 0x1, r0) keyctl$link(0x8, r1, r0) 13:10:10 executing program 2: bpf$BPF_PROG_DETACH(0x2, 0x0, 0x0) [ 902.723353] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 902.762138] (unnamed net_device) (uninitialized): HSR: Slave1 device not specified 13:10:11 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}, 0x48) 13:10:11 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x1c}, 0x1c}}, 0x0) 13:10:11 executing program 3: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x3, r0, 0x0, 0x0) 13:10:11 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5}, @IFLA_HSR_SLAVE2={0xb, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:10:11 executing program 2: bpf$MAP_CREATE(0x12, &(0x7f0000000140)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 13:10:11 executing program 0: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1e, r0, 0x0, 0x0) [ 902.946428] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 902.963370] (unnamed net_device) (uninitialized): HSR: Slave1 device not specified 13:10:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 64) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x3f, 0x84, 0x1, 0x40, 0x0, 0x3, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x4, @perf_config_ext={0x7, 0xfffffffffffffff7}, 0x80004, 0xfff, 0x1c90, 0xe7cb6d647dc9d795, 0x6, 0x8001, 0x1, 0x0, 0x7fff, 0x0, 0x1}, 0x0, 0x8, 0xffffffffffffffff, 0x0) (async, rerun: 64) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:10:11 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(r0, 0xc01064c2, 0x0) syz_open_dev$dri(&(0x7f0000000380), 0x8129, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)={0x1c}, 0x1c}}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 13:10:11 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1a, 0x0, 0x0, 0x0, 0x4, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x1}, 0x48) 13:10:11 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) 13:10:11 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/xpad', 0x0, 0x0) read$rfkill(r0, 0x0, 0x0) 13:10:11 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5}, @IFLA_HSR_SLAVE2={0x10, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:10:11 executing program 3: bpf$BPF_PROG_DETACH(0x21, 0x0, 0x0) 13:10:11 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) [ 903.060967] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 903.095041] (unnamed net_device) (uninitialized): HSR: Slave1 device not specified 13:10:11 executing program 0: r0 = socket(0x2b, 0x1, 0x0) setsockopt$inet_dccp_buf(r0, 0x21, 0x0, 0x0, 0x0) 13:10:11 executing program 1: request_key(&(0x7f0000001580)='syzkaller\x00', &(0x7f00000015c0)={'syz', 0x3}, 0x0, 0x0) 13:10:11 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="0e00000009000d00ffff000008000b008000000008000b0008000000060005003f060014060005002207000008000b00ffff000007000100667700006c0002001400030076657468300000000000000000000000140003006261746164765f736c6176655f3100001400030076657468305f766972745f77696669001400030070696d367265673100000000000000000800010002119371e63d351c42fc8a000700080001000500050008000500ffffff7f648150c4ceaa7dd1a0d0d475cf2ad4f3edd8ad2f40680663047205957135710a8568f4f2be375119aba03c6339236c72fcc387fa25a49b2caad6c4362b117c0cb1ab62d1266265173d5e81529e3038840fb985a64a3fc2e74e1c03b7168b9efdb16c2780d254b05444bb2e701aabbc2bf3e9f4ea99dc25aaa1b6b6593e8878ae7525beafd4a0b4fb32180c485a17dc8ba9409d4bece6d7f8512d9b996a912da234cace74de11499d7abe9606"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5}, @IFLA_HSR_SLAVE2={0x14, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:10:11 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) 13:10:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)) perf_event_open(&(0x7f0000000480)={0x2, 0xfffffe63, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x2, 0x80) 13:10:11 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000200)=0x3, 0x4) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc) 13:10:11 executing program 1: add_key$fscrypt_v1(&(0x7f0000000240), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$user(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="9e", 0x1, 0xfffffffffffffffe) 13:10:11 executing program 0: r0 = socket(0x2b, 0x1, 0x0) ioctl$SIOCAX25GETINFO(r0, 0x89ed, &(0x7f0000000000)) 13:10:11 executing program 3: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@getstat={0xe0, 0x15, 0x0, 0x0, 0x0, {{'drbg_nopr_hmac_sha1\x00'}}}, 0xe0}}, 0x0) 13:10:11 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5}, @IFLA_HSR_SLAVE2={0x24, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:10:11 executing program 2: socketpair(0x25, 0x5, 0x1c3, &(0x7f0000000040)) [ 903.290274] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 903.298477] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 903.310728] (unnamed net_device) (uninitialized): HSR: Slave1 device not specified 13:10:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)) perf_event_open(&(0x7f0000000480)={0x2, 0xfffffe63, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x2, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) pipe(&(0x7f0000000040)) (async) perf_event_open(&(0x7f0000000480)={0x2, 0xfffffe63, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) open(&(0x7f0000000000)='./file0\x00', 0x2, 0x80) (async) 13:10:11 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)={0x0, "461b0ab54fa221b130f510c8118b43980ae55b4a4f442720b3bcba97e1b13a063bef883a590cab45df3c594a8d0fc2aaf6eb20be48737ae3367299d773aaf45b"}, 0x48, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0x1e, r0, r0, 0x0, 0x0) 13:10:11 executing program 3: add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)={0x0, "461b0ab54fa221b130f510c8118b43980ae55b4a4f442720b3bcba97e1b13a063bef883a590cab45df3c594a8d0fc2aaf6eb20be48737ae3367299d773aaf45b"}, 0x48, 0xffffffffffffffff) add_key$user(&(0x7f0000000340), 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$invalidate(0x15, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000001640)='ceph\x00', &(0x7f0000001680)={'syz', 0x1}, &(0x7f00000016c0)='encrypted\x00', 0x0) 13:10:11 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5}, @IFLA_HSR_SLAVE2={0x2c, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) [ 903.394227] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 903.412555] (unnamed net_device) (uninitialized): HSR: Slave1 device not specified 13:10:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)) perf_event_open(&(0x7f0000000480)={0x2, 0xfffffe63, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x2, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) pipe(&(0x7f0000000040)) (async) perf_event_open(&(0x7f0000000480)={0x2, 0xfffffe63, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) open(&(0x7f0000000000)='./file0\x00', 0x2, 0x80) (async) 13:10:11 executing program 1: socket(0x15, 0x80005, 0x0) 13:10:11 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10d, 0x8, 0x0, 0x300) 13:10:11 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000100), 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0x401870cb, 0x0) 13:10:11 executing program 3: prctl$PR_GET_NAME(0x10, &(0x7f00000002c0)=""/17) 13:10:11 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000340)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10, 0x0}, 0x0) 13:10:11 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) 13:10:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x7fffffff, 0x10}, 0xc) lseek(r0, 0x8000, 0x2) [ 903.522626] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 903.554680] (unnamed net_device) (uninitialized): HSR: Slave1 device not specified 13:10:11 executing program 0: bpf$MAP_CREATE(0xe, &(0x7f0000001240)=@bloom_filter, 0x48) 13:10:11 executing program 3: renameat(0xffffffffffffffff, &(0x7f0000000280)='./file1\x00', 0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00') 13:10:11 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5}, @IFLA_HSR_SLAVE2={0x50, 0x2, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:10:11 executing program 1: name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2000) 13:10:11 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001240)=@bloom_filter={0x1e, 0x0, 0x1, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, 0x0, 0x0, 0x4}, 0x20) 13:10:11 executing program 0: pselect6(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140)={&(0x7f0000000100)={[0x6]}, 0x8}) 13:10:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x7fffffff, 0x10}, 0xc) lseek(r0, 0x8000, 0x2) 13:10:11 executing program 3: socketpair(0x3, 0x0, 0xffffffff, &(0x7f0000000280)) 13:10:11 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001240)=@bloom_filter={0x1e, 0x0, 0x1, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, 0x0, &(0x7f0000000100), 0x2}, 0x20) 13:10:11 executing program 2: syz_init_net_socket$ax25(0x3, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) 13:10:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000140)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in6=@private1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, 0xb8}}, 0x0) [ 903.732234] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.4'. 13:10:11 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockname$ax25(r0, &(0x7f0000000140)={{0x3, @rose}, [@null, @rose, @netrom, @default, @null, @null, @rose, @null]}, &(0x7f0000000100)=0x48) 13:10:12 executing program 1: kexec_load(0x0, 0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x4}], 0x1) 13:10:12 executing program 3: add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) [ 903.776444] (unnamed net_device) (uninitialized): HSR: Slave1 device not specified 13:10:12 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5}, @IFLA_HSR_SLAVE2={0x8, 0x3, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:10:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x7fffffff, 0x10}, 0xc) lseek(r0, 0x8000, 0x2) 13:10:12 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000000c0)={'tunl0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast1, @dev}}}}) 13:10:12 executing program 2: add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)={0x0, "461b0ab54fa221b130f510c8118b43980ae55b4a4f442720b3bcba97e1b13a063bef883a590cab45df3c594a8d0fc2aaf6eb20be48737ae3367299d773aaf45b"}, 0x48, 0xffffffffffffffff) 13:10:12 executing program 1: socketpair(0x0, 0x0, 0x8, &(0x7f0000000000)) syz_init_net_socket$ax25(0x3, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 13:10:12 executing program 3: socket$inet6_sctp(0x1c, 0x5, 0x84) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) socket$inet6_sctp(0x1c, 0x1, 0x84) r0 = socket(0x2, 0x5, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x10, 0x2}, 0x10) sendto$inet(r0, &(0x7f0000000240)="b4d78ea9c395137a735a76979187973496ec1745f7975399f712eda40e58a6d212d2972ef86afd750c7e8308c0ccba99e7f698a152ad5f9cf339cfc1c06382e31c158b8c19fbe13f85b04af205d11029f2b3c40e75c729abd9c71437366f1679b54f13a42602bf25d33bf001e83b0de70bbeae9e1cad291e5fe34416a7be2e97754c534058145a5af3faae10380a2fe0fd4d02143f5d46ec1d418d7a62589b9abae474c532f72cd7821a5d46e860aa006c973cb0d57c758493e9cd9ca196923481c59e93348f9b2107b073ed7e12867032a5ba26bf5c16da81b7862a4279a51709f46b", 0xe3, 0x20104, &(0x7f0000000000)={0x10, 0x2}, 0x10) 13:10:12 executing program 2: add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)={0x0, "461b0ab54fa221b130f510c8118b43980ae55b4a4f442720b3bcba97e1b13a063bef883a590cab45df3c594a8d0fc2aaf6eb20be48737ae3367299d773aaf45b"}, 0x48, 0xffffffffffffffff) add_key$user(&(0x7f0000000340), 0x0, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000001640)='ceph\x00', &(0x7f0000001680)={'syz', 0x1}, &(0x7f00000016c0)='encrypted\x00', 0x0) 13:10:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x7ff}, 0xffffffffffffffff, 0x20000000000, 0xffffffffffffffff, 0x8) 13:10:12 executing program 0: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) [ 903.935680] (unnamed net_device) (uninitialized): HSR: Slave2 device not specified 13:10:12 executing program 1: bpf$MAP_CREATE(0x8, &(0x7f0000001240)=@bloom_filter, 0x48) 13:10:12 executing program 3: socketpair(0x27, 0x0, 0x0, &(0x7f0000000400)) 13:10:12 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5}, @IFLA_HSR_SLAVE2={0x8, 0x5, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:10:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x7ff}, 0xffffffffffffffff, 0x20000000000, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x7ff}, 0xffffffffffffffff, 0x20000000000, 0xffffffffffffffff, 0x8) (async) 13:10:12 executing program 2: setfsgid(0xee00) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 13:10:12 executing program 0: semop(0x0, &(0x7f00000001c0)=[{0x0, 0x2, 0x1000}], 0x1) 13:10:12 executing program 1: read$char_usb(0xffffffffffffffff, 0x0, 0x0) syz_usbip_server_init(0x5) 13:10:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x7ff}, 0xffffffffffffffff, 0x20000000000, 0xffffffffffffffff, 0x8) [ 904.084347] (unnamed net_device) (uninitialized): HSR: Slave2 device not specified 13:10:12 executing program 3: syz_init_net_socket$ax25(0x3, 0x2, 0x6) 13:10:12 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5}, @IFLA_HSR_SLAVE2={0x8, 0x6, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:10:12 executing program 2: bpf$MAP_CREATE(0xd, &(0x7f0000001240)=@bloom_filter, 0x48) 13:10:12 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0xc, 0x0, 0x0) 13:10:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rpcgss_svc_seqno_low\x00'}, 0x10) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:10:12 executing program 0: bpf$MAP_CREATE(0x1d, &(0x7f0000001240)=@bloom_filter, 0x48) 13:10:12 executing program 2: syz_open_dev$dri(&(0x7f0000000c80), 0x80000000, 0x385903) 13:10:12 executing program 3: syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KDSKBENT(0xffffffffffffffff, 0x4b47, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000004200), 0xffffffffffffffff) 13:10:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rpcgss_svc_seqno_low\x00'}, 0x10) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 904.233654] (unnamed net_device) (uninitialized): HSR: Slave2 device not specified 13:10:12 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5}, @IFLA_HSR_SLAVE2={0x8, 0x8, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) [ 904.372164] (unnamed net_device) (uninitialized): HSR: Slave2 device not specified 13:10:12 executing program 1: bpf$MAP_CREATE(0x9, &(0x7f0000001240)=@bloom_filter, 0x48) 13:10:12 executing program 0: r0 = socket(0x2b, 0x1, 0x0) getsockopt$PNPIPE_ENCAP(r0, 0x113, 0x1, 0x0, 0x0) 13:10:12 executing program 3: add_key$fscrypt_v1(&(0x7f0000000240), 0x0, &(0x7f00000002c0)={0x0, "461b0ab54fa221b130f510c8118b43980ae55b4a4f442720b3bcba97e1b13a063bef883a590cab45df3c594a8d0fc2aaf6eb20be48737ae3367299d773aaf45b"}, 0x48, 0xffffffffffffffff) add_key$user(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) 13:10:12 executing program 2: r0 = socket(0x11, 0x3, 0x0) setsockopt$MRT6_DEL_MIF(r0, 0x107, 0x14, 0x0, 0x0) 13:10:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rpcgss_svc_seqno_low\x00'}, 0x10) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:10:12 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="0e00000009000d00ffff000008000b008000000008000b0008000000060005003f060014060005002207000008000b00ffff000007000100667700006c0002001400030076657468300000000000000000000000140003006261746164765f736c6176655f3100001400030076657468305f766972745f77696669001400030070696d367265673100000000000000000800010002119371e63d351c42fc8a000700080001000500050008000500ffffff7f648150c4ceaa7dd1a0d0d475cf2ad4f3edd8ad2f40680663047205957135710a8568f4f2be375119aba03c6339236c72fcc387fa25a49b2caad6c4362b117c0cb1ab62d1266265173d5e81529e3038840fb985a64a3fc2e74e1c03b7168b9efdb16c2780d254b05444bb2e701aabbc2bf3e9f4ea99dc25aaa1b6b6593e8878ae7525beafd4a0b4fb32180c485a17dc8ba9409d4bece6d7f8512d9b996a912da234cace74de11499d7abe9606"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5}, @IFLA_HSR_SLAVE2={0x8, 0x9, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:10:12 executing program 2: pipe2$watch_queue(&(0x7f0000002500), 0x80) 13:10:12 executing program 0: r0 = socket(0x2b, 0x1, 0x0) getsockname$ax25(r0, 0x0, &(0x7f0000000080)) 13:10:12 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x1b}, 0x48) [ 904.708385] (unnamed net_device) (uninitialized): HSR: Slave2 device not specified 13:10:12 executing program 1: socket$inet6_dccp(0xa, 0x6, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) connect$ax25(r0, &(0x7f0000000380)={{0x3, @null, 0x6}, [@null, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}, 0x48) 13:10:12 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5}, @IFLA_HSR_SLAVE2={0x8, 0xa, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:10:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f0000002300)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000000f00)={0xd04, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_WOL_MODES={0xe8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0xad, 0x5, "295b643b8d20655915e3373c6ed54f1e50e3e17c31297a689a016d3aa65313a40bef50672a72897d4e5c093209b76ec4b8b69f604681d6d343a19325cd206245aab0fa7a8764c72729b3aecf66aa251443d87736fd3548aa6ee6d5a88f2cc4dee10c6ab37a17a809e4a9735284e0d95dbe0c8d0365d74e0f2046f96a92e585c0cacd21e7414a7c955c3de58453f7d5fb4589781e6c7b0b6476ac62dd2490f9e3b48b8ee5ecc58a9de8"}, @ETHTOOL_A_BITSET_VALUE={0x31, 0x4, "e4d0565e941a316b040f02a0af04ba5001173106fc25f82ce745c88b56b20830c5256cea7f1ae4023842bd5b6c"}]}, @ETHTOOL_A_WOL_HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg\x00'}]}, @ETHTOOL_A_WOL_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0x29, 0x3, "a0df1d6844e6cb899f62686b3460137ed44bf033bcc9c21e4053a9441f6f228c0b0692e0ab"}, @ETHTOOL_A_WOL_MODES={0x178, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, 'syz'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, ':}\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x75, 0x5, "0be29a3f3ecf5fc87e017ea35b339764c13998a60b80eb7de7452e885a3f0c7c2bd12040983621c5ce4decd4b4ade0a66635f40e47b6225d7ce6ad7485fc66a6a2a841e4f6f7671f04ffa1e912e513cc49bc9a8ab7aa0437ea5dfb86d955f1e9764911948fc54e0cf5b04a48a000fe8c16"}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_BITS={0x14, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}, @ETHTOOL_A_BITSET_MASK={0x69, 0x5, "d91785b4e4be4d27a8b85916c45cf1a67204292a08a2d77707d063009db278fcb54bf1afc74f20d64879ffbea0e362b1fd8c3ae73e76e75c58d1105494b25f5ccf1c7e1a80a15eb8235ddc482782229e047704c43e31f0a203af82f07c031fbd41edc8b669"}]}, @ETHTOOL_A_WOL_MODES={0x9f4, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0xd, 0x5, "d36e60e93ac66b959c"}, @ETHTOOL_A_BITSET_VALUE={0x9dd, 0x4, "9b1e113bb0d7127c1076132c7450e596be855c9646ac83b63baad0862f91101959ebfcb0c27a5d21aa25514ffa37a39947fe3a12298ef869786d0828fe9bc470d62d315e774f2307ad76f980fd362084e3d8b79bfc65fcfb5e266192e9b7456a485fb5aacafbc587cdd34e1cb96f5dd7164b99624ea0d0e76b4ebcbc6ac091ceff2518348528ceefcd66e8adc0e30f544627b95c09ccd8eb104d24623cc7486b5c4b1b9776f2ef0ba44459a76fdbd795f591156b1ad478d91ddf47bc3499b2b81d4ca94c075e125326b8333fefdb704745046d613ea7b0d506cefe1480b03ff091237d2d8c1637342f0efcc81a0b88aa7bfcb2619b9ce745e8537b2d9a72fedaf25afd3e8dfbe224713af52127a3b57515feb22062f018ea9e8091d90a2e2edf63c7ee550ea34326681821ecdabb009a8ebde6ef1cbced6b3332c2f7aa87c415a529997951f9eec1e779ecab843132293210c5d76af73ba1eff2a581db3c429cb0b4f9f7343386c1caac1336469698ecd07e54c4f1811d2203b481c3a2b5d50379be8c7e584607f0eb6befa6cf50d45d17bbc0a3ec2f2d06d92a616e8615d5f8ca8f394eebce1ae4e0c0976d023cc6d5810013af9ac791ad40263fd45497a564d0367816ef3d961b6623587b2374d933416be624f3564c5ad28f914bc5a3bf2f956cad26bb556c0dc7ac41033eabb9e2c8082b4e908db4eaad2cc347bac9d3d7ca51452b60593dcba89951086781b075c14eb3ce4ee28f9584cd0a129f412456d3cd2110fcab189b0d3c8508dece6d5fd005ca9ed8ff1f4646255a0eb4902492b4fd04956d169c4d3ed05748037df624ffe0ef040fed5c69bad17f7a518013ce47444b75af7c744c17031f19d2c0d301220c4a3fa4b7e9c26b9a3242c856b0f2d8cc2f163e4ea2c84855037bfa454f1c02b4d1b60d51b07f5ef394ee4194c0ab8a481a37f30f37da7dd3ab5ea5a69ab8d0822a35b3e7ca790a4253802547a60f3537aadeaa5f4f5f808f42f843b16ebcaf6a98c7b6bf24026a23e0c33cb442d8595aa06b4cc2451ac1bb3c512ed4f805564fc8b6f293407c5aeb0f7dcb8617152de3a0a1418099592f06d33323925fc869e0bd5f00d8335aaaef5685a2193acec16a9aba2d6135b64db70df9ed1089695b412f60b8ad801e690b5006b91dbffe834e3257b410344e5442ee741a3d3a9f8f675e9f32555c84a1bafef1ba0257e87ffc1e7d00f212cda4b0f2a71e06f528cdfa64ae66c86712cca8dc2a4700a037c8106159e2e8de51db8c860cfec8f13eafbebc4bd32bb9d6fa0a4cae02be5bf5469c2d22b0fc1298f94a9f181f74bdf3bb5020842f2eb026cd2254879be7434a6cc97a5f683aa994251d789a17bd33778e89fb9b5fc88152130152e5ae19b5e87b3ce8f10dbdaf106d59c9af1311125a9419fd8c9b7ac91f45222ac26703cdc2948f9db4850d78213df15911b9915c991541933a69d22eda7f6eda27cbc9f630fee2f6ac9d96f4997d026b79fa7b4d7c3aa78e8e1179bc0845df03d29dad3f1ed60868eab624ba48cbaa0f8eb172ff8807af9cc3e568fae17a188aa93ded1505f1d493bef96f20041ef3c265736b78183632cb6d5f9087969baec292e8425dc9f6ef0a61597e64744f51b1baf9b560703c92af3a59012e2577359b3b9d225aa53bb45329626f79f8a65253502bf9e25ad535a13d100c65cd6979c4f0993343053706c6cf00a37ac729ed3b27476fe96557b6081f1752fc142f586040f0c8af0b44bda03aea0190c9a8177d4c2afe36b89c4df3f542be3d0e0401470b43d3bc9ca2ae50f19bd25546f2f181cf6902bc9d45bfc4519c4f87836390727e5960a191d1bf1f3e99b831ae69c2671ed93985a69a97a9ac6bc2985fbc5dc5a82e3c53a6d6da13db5156947dc4813131a795b2956d9fbf5b7df6a11533da27da15c9872d6ba750dd447ec229e74e4cad3b9db67ee6af3493972cc9caf47478647fae393a83d1edf8ce9546d54ea8a8b0a272acb80b254fc20eda9ccd809f576ad8b9b3e4be6fea634a8d50836766a9b579d7c2ea0d9a54867fbef31ab2a4440e5382e16257f4b2a13023da097e5c20e3f78f5c10ff9cb52c9868b6477006188227e7a6b176b810eb07f6a4d7a1b6655e08e2075fca00087365a4d88bd4f5c6800b85f47c54ca6fa3f155563758a31a677f01c778edc232801f4bf9226847781cb7ad4c2867bf1f2d8b45e4aca1dc2b8a3b8dd82f1acd5b7f071b0b45b0bba716378e2201e28288b76a1bd305b8860dd9ba4096e8bfd466ae551a75d99fee449935745847240b544469f618df078dece16b71639d6fffe1bab072584198c275177632cdb560dc5bd2298cc647cd60ee73e0cc2a74e21160fe728a9e8bb5517b455de29082c1731006e7c92268788f2e09dcd841bb935a33cfcc446ecb9cf10fe7a38eddb4bfa0584df59fc3120d740ab879cb9b189422621231b7b976b840ee0925545852ff0afd0faafcdc059922c111378758e24425f269ec361b1c0c3cf10381638743131e2a6be2df9c7fdd2845f179eee0c9b1f50780b05723bfb11d94b39bc306ff7eb39233239a132310a36ebf8ba012a3df70de367f875a1305011d1b53eb991cecba07458198e5b35d2d08d2146d47be4ed677cb75a82ad707009151ac77dd399610c50280aa6068ca20beae9bf2129e07e95cf093f0797b6f7a0b45420d02355d8f3e7b73e121c204ffe04f51fcd8674c0a89c794c1eb82a593081cb03373014ef5edb1540607620de78323db1077fe2280cf8dfd88de5642a06943d36406ac62e438784d8e6e5619e99e4b855a0dc363f433f07abe6ab78786d98966b3061ee9811a30a7778d081e60f0917bd20d64784fcd0ce947ca5da5f08d9acaeb6c16522e893df63cb98282b5f16bdb444e94dd67a4a92ad6f94e24223699745a5037be649738a38a60a11bd2018c43f7d3069c33df2b9bd9e1842a282695a73151895cef5be62d235efbc96b6026fe5a4a631df52e6de95923b9a823ad135808e99b89be796921cbe0837b2168115274efcafcc990e54e7acdc9af433d755be81a7a5d2716e736789d1a579b0447d31b3c1d02b80e45967e27d27eab1517dd73febbead5c1f3e367c7a409b26cc35d461b33d6b5a343cbcae0a7505281b99834589c0a76c438831567e5e42e82d5b5370176ac449fe8eba6cf06188f00157d520f6ea0bfc65c7d4005371775f9b9569127e830497f8cbb4603435a9aa64d740c55ced88855b4d50caf42ecd3fa6a730ba6ff7186fd558164085674929d95fab8f80d3436b59949ede907c32edaaf640f73e5592076c9f05d0019e20adc27e09b4ad3119a428a2778df7aa7ec3a5e1dff1495af4f58481c483f6b38bb6ee189869d5e814760104c85d801e2ee15270238d29b91913e2ac0448b92a10fd503d459736e7d8ffcb47f629ede6d1e03c8166e8cfaea3c5e966f908ba21b74b757326c3728d80afe90de7b3285ff867e2a8525324c9161a0369c0d3fcea59a03193a3a80b2439bb724ed2c33abc80e001dababd25f8666665828fd90d75f"}]}]}, 0xd04}}, 0x0) 13:10:13 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x1600bd74, 0x0, 0x118) 13:10:13 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000001780)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000001540)={r3, 0x2, 0x81, 0x1}) ioctl$BTRFS_IOC_BALANCE_V2(r0, 0xc4009420, &(0x7f0000000500)={0x9, 0x6, {0x2, @struct={0x3, 0x1}, 0x0, 0x2, 0x4, 0x28cc, 0x10000, 0xff, 0x40, @usage, 0x200, 0xff, [0x5, 0x1, 0x401, 0x3f, 0x7ff, 0x7aed]}, {0xe3, @usage=0x10001, 0x0, 0x4, 0x8, 0x1, 0x4, 0x3, 0x801, @struct={0x3, 0x8}, 0x0, 0x9a, [0x0, 0xff, 0x1, 0xbc, 0x100000001, 0x5]}, {0xde, @usage=0x3, r3, 0x0, 0x404000000000000, 0xfffffffffffffffa, 0x6, 0x800, 0x4f, @usage=0xfff, 0x1f, 0xffffffe2, [0xffffffff80000000, 0x2, 0x7, 0x6, 0x7, 0x8000000000000000]}, {0x8000, 0x6, 0x1}}) fstat(r0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000080)='\x00') 13:10:13 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000100), 0x610001, 0x0) write$eventfd(r0, 0x0, 0x0) 13:10:13 executing program 3: r0 = socket(0x11, 0xa, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002040)={&(0x7f0000000080), 0xc, &(0x7f0000002000)={0x0}}, 0x0) 13:10:13 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x9}]}) [ 904.855838] (unnamed net_device) (uninitialized): HSR: Slave2 device not specified 13:10:13 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5}, @IFLA_HSR_SLAVE2={0x8, 0xb, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:10:13 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet6_int(r0, 0x29, 0x10, 0x0, &(0x7f0000000080)) 13:10:13 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000001780)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000001540)={r3, 0x2, 0x81, 0x1}) ioctl$BTRFS_IOC_BALANCE_V2(r0, 0xc4009420, &(0x7f0000000500)={0x9, 0x6, {0x2, @struct={0x3, 0x1}, 0x0, 0x2, 0x4, 0x28cc, 0x10000, 0xff, 0x40, @usage, 0x200, 0xff, [0x5, 0x1, 0x401, 0x3f, 0x7ff, 0x7aed]}, {0xe3, @usage=0x10001, 0x0, 0x4, 0x8, 0x1, 0x4, 0x3, 0x801, @struct={0x3, 0x8}, 0x0, 0x9a, [0x0, 0xff, 0x1, 0xbc, 0x100000001, 0x5]}, {0xde, @usage=0x3, r3, 0x0, 0x404000000000000, 0xfffffffffffffffa, 0x6, 0x800, 0x4f, @usage=0xfff, 0x1f, 0xffffffe2, [0xffffffff80000000, 0x2, 0x7, 0x6, 0x7, 0x8000000000000000]}, {0x8000, 0x6, 0x1}}) fstat(r0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000080)='\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) (async) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000001780)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) (async) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000001540)={r3, 0x2, 0x81, 0x1}) (async) ioctl$BTRFS_IOC_BALANCE_V2(r0, 0xc4009420, &(0x7f0000000500)={0x9, 0x6, {0x2, @struct={0x3, 0x1}, 0x0, 0x2, 0x4, 0x28cc, 0x10000, 0xff, 0x40, @usage, 0x200, 0xff, [0x5, 0x1, 0x401, 0x3f, 0x7ff, 0x7aed]}, {0xe3, @usage=0x10001, 0x0, 0x4, 0x8, 0x1, 0x4, 0x3, 0x801, @struct={0x3, 0x8}, 0x0, 0x9a, [0x0, 0xff, 0x1, 0xbc, 0x100000001, 0x5]}, {0xde, @usage=0x3, r3, 0x0, 0x404000000000000, 0xfffffffffffffffa, 0x6, 0x800, 0x4f, @usage=0xfff, 0x1f, 0xffffffe2, [0xffffffff80000000, 0x2, 0x7, 0x6, 0x7, 0x8000000000000000]}, {0x8000, 0x6, 0x1}}) (async) fstat(r0, &(0x7f0000000000)) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000080)='\x00') (async) 13:10:13 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x1600bd74, &(0x7f00000001c0)=ANY=[], 0x118) 13:10:13 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x1600bd7f, 0x0, 0x118) 13:10:13 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) write$eventfd(r0, 0x0, 0x0) 13:10:13 executing program 0: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) [ 904.988307] (unnamed net_device) (uninitialized): HSR: Slave2 device not specified 13:10:13 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="0e00000009000d00ffff000008000b008000000008000b0008000000060005003f060014060005002207000008000b00ffff000007000100667700006c0002001400030076657468300000000000000000000000140003006261746164765f736c6176655f3100001400030076657468305f766972745f77696669001400030070696d367265673100000000000000000800010002119371e63d351c42fc8a000700080001000500050008000500ffffff7f648150c4ceaa7dd1a0d0d475cf2ad4f3edd8ad2f40680663047205957135710a8568f4f2be375119aba03c6339236c72fcc387fa25a49b2caad6c4362b117c0cb1ab62d1266265173d5e81529e3038840fb985a64a3fc2e74e1c03b7168b9efdb16c2780d254b05444bb2e701aabbc2bf3e9f4ea99dc25aaa1b6b6593e8878ae7525beafd4a0b4fb32180c485a17dc8ba9409d4bece6d7f8512d9b996a912da234cace74de11499d7abe9606"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5}, @IFLA_HSR_SLAVE2={0x8, 0x10, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:10:13 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000001780)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000001540)={r3, 0x2, 0x81, 0x1}) ioctl$BTRFS_IOC_BALANCE_V2(r0, 0xc4009420, &(0x7f0000000500)={0x9, 0x6, {0x2, @struct={0x3, 0x1}, 0x0, 0x2, 0x4, 0x28cc, 0x10000, 0xff, 0x40, @usage, 0x200, 0xff, [0x5, 0x1, 0x401, 0x3f, 0x7ff, 0x7aed]}, {0xe3, @usage=0x10001, 0x0, 0x4, 0x8, 0x1, 0x4, 0x3, 0x801, @struct={0x3, 0x8}, 0x0, 0x9a, [0x0, 0xff, 0x1, 0xbc, 0x100000001, 0x5]}, {0xde, @usage=0x3, r3, 0x0, 0x404000000000000, 0xfffffffffffffffa, 0x6, 0x800, 0x4f, @usage=0xfff, 0x1f, 0xffffffe2, [0xffffffff80000000, 0x2, 0x7, 0x6, 0x7, 0x8000000000000000]}, {0x8000, 0x6, 0x1}}) (async) fstat(r0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000080)='\x00') 13:10:13 executing program 3: capset(&(0x7f0000001180)={0x20080522}, &(0x7f00000011c0)) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 13:10:13 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_mreq(r0, 0x0, 0x20, 0x0, &(0x7f0000000040)) 13:10:13 executing program 1: syz_genetlink_get_family_id$gtp(&(0x7f0000000980), 0xffffffffffffffff) 13:10:13 executing program 0: semget(0x0, 0x4f1f8a808c6a7297, 0x0) 13:10:13 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0x3, &(0x7f0000000300)=@raw=[@map_idx={0x18, 0x5}, @ldst], &(0x7f0000000340)='GPL\x00', 0x2, 0x75, &(0x7f0000000380)=""/117, 0x0, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000400), 0x8, 0x10, 0x0}, 0x80) [ 905.129464] (unnamed net_device) (uninitialized): HSR: Slave2 device not specified 13:10:13 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5}, @IFLA_HSR_SLAVE2={0x8, 0x14, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:10:13 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r0, &(0x7f0000000040)='j', 0x1, 0x8c0, &(0x7f0000000080)={0xa, 0x0, 0x0, @private1}, 0x1c) 13:10:13 executing program 1: getresuid(&(0x7f00000015c0), 0x0, 0x0) 13:10:13 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000009580)={'ip6gretap0\x00'}) 13:10:13 executing program 0: socketpair(0xa, 0x0, 0x0, &(0x7f00000000c0)) 13:10:13 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000001600)={0x0, "48006cf0a81704e3c7c90110455edcd5"}) perf_event_open(&(0x7f0000000100)={0x7, 0x80, 0x5a, 0x5, 0x2, 0x1, 0x0, 0x7, 0x40248, 0x9, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0x0, 0x5}, 0x201, 0x0, 0x8, 0x7, 0x7, 0x8, 0x101, 0x0, 0x80, 0x0, 0x400}, 0x0, 0x3, 0xffffffffffffffff, 0x8) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) splice(r1, &(0x7f00000001c0), 0xffffffffffffffff, &(0x7f00000008c0)=0x1, 0x9, 0x0) write$binfmt_script(r0, &(0x7f0000000ac0)={'#! ', './file1/file0', [{}, {0x20, 'ramfs\x00'}], 0xa, "60d65b39200fd5b99e53df8685d41fc7e3426855e3092eae555e900659412d7970bed0313a4ed3c580982d3981c62e9a3c035fb1404387eee3bbe81fafda07"}, 0x58) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r3) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000006c0), 0x2, &(0x7f0000000700)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@posixacl}, {@loose}], [{@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, ',{*-$(+'}}, {@obj_type={'obj_type', 0x3d, '@![%#'}}, {@fowner_gt={'fowner>', r3}}]}}) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r6, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r7, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000003640)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) statx(r5, &(0x7f0000003500)='./file1\x00', 0x2000, 0x40, &(0x7f0000003540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r4, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64=r8, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="10666f776e657235", @ANYRESDEC=r12, @ANYRESHEX=r9]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)={{}, {0x1, 0x2}, [{0x2, 0x5}, {0x2, 0x5}, {0x2, 0x5, 0xee00}, {}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2}, {0x2, 0x8, 0xee00}, {}, {0x2, 0x5}, {0x2, 0x4, r7}], {0x4, 0x2}, [{0x8, 0x4, r10}, {0x8, 0x5, r11}, {0x8, 0x3, r11}, {0x8, 0x1, 0xee01}, {}, {0x8, 0x7, 0xffffffffffffffff}, {0x8, 0x6, r12}, {0x8, 0x2, r13}], {0x10, 0x4}, {0x20, 0x5}}, 0xb4, 0x3) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)={0x78, 0x15, 0x400, 0x70bd29, 0x25dfdbff, "", [@generic, @nested={0x67, 0x57, 0x0, 0x1, [@typed={0x14, 0x30, 0x0, 0x0, @ipv6=@ipv4={'\x00', '\xff\xff', @local}}, @generic="c39617b551f4abcc83f71064a428c2bb31407d05d283c9585a938d4c082ed76323d7d29a2feeef24cef5ef151616a302f97140c6ef5c8658452d55037221dcecd97b8ae9eff80c8778fc3bbb592314"]}]}, 0x78}, {&(0x7f0000000200)={0x1d4, 0x26, 0x2, 0x70bd25, 0x25dfdbfb, "", [@generic="66771e713aa3cba39b6e3e9c5b0dc14c56cbdcc376ac3203bfba832f12fdd9ad65542ec64f3a411b9a0b6efe91eaebb35402798ea6a7b84be3f4d35d1f79aa3a6834bf00fc98fe1bcaba10100309e4548fd3712bb0d1efba0feb62f3cb249ec4d5a0395b48f91bcfcf097c5f8a18d967b7832a53d3707688827d3e5a552c67545fd4cab6252ab70efa2ee63556eab08dd2e370e6fcf387d88682da01d86e8d12a79bf0b70e", @typed={0x8, 0x43, 0x0, 0x0, @u32=0x3}, @nested={0x10b, 0x8e, 0x0, 0x1, [@typed={0x8, 0x65, 0x0, 0x0, @u32=0x80000000}, @typed={0x8, 0x6a, 0x0, 0x0, @fd}, @generic="0641a96c33065cdbd0cd4f29d7ef55b6c353ef01deb720db24afc672ac4cc7c4916d999b14fae920c06009d88c8be7b6f37f96fefe482b2e4540216ef5b5cb7290873187bdfb68e34bb2b4e9bb6c052b642d264ca4732aa8ca3e55a35aafc8ca370af955dfd5c01ed7a7aa63e37526be76b5066b5538364f08c728264243b22a8883aa6e8131a98244e0409c746f121de1ecc0462da995e3785966317aab1e7f63509c83aef7d00fbece33df1443dd442d30b93843ca00d574041ca8703610ec93869f6504a46205ba935daefe3fc021164a226b4ff9dcdc9e546c8a6be0f9302b91bd1a0990721f9191219a30e6beb61b476bc78bd4ef"]}, @typed={0x8, 0x2c, 0x0, 0x0, @ipv4=@dev={0xac, 0x14, 0x14, 0xc}}]}, 0x1d4}], 0x2, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r3, r12}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r14, r15}}}], 0x78, 0x20004894}, 0x810) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:10:13 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0x0, 0x0, &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 905.264376] (unnamed net_device) (uninitialized): HSR: Slave2 device not specified 13:10:13 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="0e00000009000d00ffff000008000b008000000008000b0008000000060005003f060014060005002207000008000b00ffff000007000100667700006c0002001400030076657468300000000000000000000000140003006261746164765f736c6176655f3100001400030076657468305f766972745f77696669001400030070696d367265673100000000000000000800010002119371e63d351c42fc8a000700080001000500050008000500ffffff7f648150c4ceaa7dd1a0d0d475cf2ad4f3edd8ad2f40680663047205957135710a8568f4f2be375119aba03c6339236c72fcc387fa25a49b2caad6c4362b117c0cb1ab62d1266265173d5e81529e3038840fb985a64a3fc2e74e1c03b7168b9efdb16c2780d254b05444bb2e701aabbc2bf3e9f4ea99dc25aaa1b6b6593e8878ae7525beafd4a0b4fb32180c485a17dc8ba9409d4bece6d7f8512d9b996a912da234cace74de11499d7abe9606"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5}, @IFLA_HSR_SLAVE2={0x8, 0x63, r12}, @IFLA_HSR_SLAVE1={0x8, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:10:13 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f0000002300)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000022c0)={&(0x7f0000000f00)={0x14}, 0x14}}, 0x0) 13:10:13 executing program 2: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, &(0x7f0000000080)={0x0, 0x0, @a}, 0x48, r0) 13:10:13 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 13:10:13 executing program 0: capset(&(0x7f0000000300)={0x19980330}, &(0x7f0000000340)) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) 13:10:13 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) (async, rerun: 64) preadv(0xffffffffffffffff, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) (async, rerun: 64) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000001600)={0x0, "48006cf0a81704e3c7c90110455edcd5"}) (async, rerun: 32) perf_event_open(&(0x7f0000000100)={0x7, 0x80, 0x5a, 0x5, 0x2, 0x1, 0x0, 0x7, 0x40248, 0x9, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0x0, 0x5}, 0x201, 0x0, 0x8, 0x7, 0x7, 0x8, 0x101, 0x0, 0x80, 0x0, 0x400}, 0x0, 0x3, 0xffffffffffffffff, 0x8) (async, rerun: 32) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) splice(r1, &(0x7f00000001c0), 0xffffffffffffffff, &(0x7f00000008c0)=0x1, 0x9, 0x0) (async, rerun: 32) write$binfmt_script(r0, &(0x7f0000000ac0)={'#! ', './file1/file0', [{}, {0x20, 'ramfs\x00'}], 0xa, "60d65b39200fd5b99e53df8685d41fc7e3426855e3092eae555e900659412d7970bed0313a4ed3c580982d3981c62e9a3c035fb1404387eee3bbe81fafda07"}, 0x58) (async, rerun: 32) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r3) (async) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000006c0), 0x2, &(0x7f0000000700)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@posixacl}, {@loose}], [{@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, ',{*-$(+'}}, {@obj_type={'obj_type', 0x3d, '@![%#'}}, {@fowner_gt={'fowner>', r3}}]}}) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) (async) r6 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r6, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r7, 0x0) (async) newfstatat(0xffffffffffffff9c, &(0x7f0000003640)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) (async) statx(r5, &(0x7f0000003500)='./file1\x00', 0x2000, 0x40, &(0x7f0000003540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r4, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64=r8, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="10666f776e657235", @ANYRESDEC=r12, @ANYRESHEX=r9]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)={{}, {0x1, 0x2}, [{0x2, 0x5}, {0x2, 0x5}, {0x2, 0x5, 0xee00}, {}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2}, {0x2, 0x8, 0xee00}, {}, {0x2, 0x5}, {0x2, 0x4, r7}], {0x4, 0x2}, [{0x8, 0x4, r10}, {0x8, 0x5, r11}, {0x8, 0x3, r11}, {0x8, 0x1, 0xee01}, {}, {0x8, 0x7, 0xffffffffffffffff}, {0x8, 0x6, r12}, {0x8, 0x2, r13}], {0x10, 0x4}, {0x20, 0x5}}, 0xb4, 0x3) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)={0x78, 0x15, 0x400, 0x70bd29, 0x25dfdbff, "", [@generic, @nested={0x67, 0x57, 0x0, 0x1, [@typed={0x14, 0x30, 0x0, 0x0, @ipv6=@ipv4={'\x00', '\xff\xff', @local}}, @generic="c39617b551f4abcc83f71064a428c2bb31407d05d283c9585a938d4c082ed76323d7d29a2feeef24cef5ef151616a302f97140c6ef5c8658452d55037221dcecd97b8ae9eff80c8778fc3bbb592314"]}]}, 0x78}, {&(0x7f0000000200)={0x1d4, 0x26, 0x2, 0x70bd25, 0x25dfdbfb, "", [@generic="66771e713aa3cba39b6e3e9c5b0dc14c56cbdcc376ac3203bfba832f12fdd9ad65542ec64f3a411b9a0b6efe91eaebb35402798ea6a7b84be3f4d35d1f79aa3a6834bf00fc98fe1bcaba10100309e4548fd3712bb0d1efba0feb62f3cb249ec4d5a0395b48f91bcfcf097c5f8a18d967b7832a53d3707688827d3e5a552c67545fd4cab6252ab70efa2ee63556eab08dd2e370e6fcf387d88682da01d86e8d12a79bf0b70e", @typed={0x8, 0x43, 0x0, 0x0, @u32=0x3}, @nested={0x10b, 0x8e, 0x0, 0x1, [@typed={0x8, 0x65, 0x0, 0x0, @u32=0x80000000}, @typed={0x8, 0x6a, 0x0, 0x0, @fd}, @generic="0641a96c33065cdbd0cd4f29d7ef55b6c353ef01deb720db24afc672ac4cc7c4916d999b14fae920c06009d88c8be7b6f37f96fefe482b2e4540216ef5b5cb7290873187bdfb68e34bb2b4e9bb6c052b642d264ca4732aa8ca3e55a35aafc8ca370af955dfd5c01ed7a7aa63e37526be76b5066b5538364f08c728264243b22a8883aa6e8131a98244e0409c746f121de1ecc0462da995e3785966317aab1e7f63509c83aef7d00fbece33df1443dd442d30b93843ca00d574041ca8703610ec93869f6504a46205ba935daefe3fc021164a226b4ff9dcdc9e546c8a6be0f9302b91bd1a0990721f9191219a30e6beb61b476bc78bd4ef"]}, @typed={0x8, 0x2c, 0x0, 0x0, @ipv4=@dev={0xac, 0x14, 0x14, 0xc}}]}, 0x1d4}], 0x2, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r3, r12}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r14, r15}}}], 0x78, 0x20004894}, 0x810) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:10:13 executing program 3: add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000280), 0x0, 0x0, 0x0, 0xfffffffffffffffd) 13:10:13 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_SET(r0, 0x0, 0x0) 13:10:13 executing program 1: semget(0x0, 0x0, 0x6b1) 13:10:13 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="0e00000009000d00ffff000008000b008000000008000b0008000000060005003f060014060005002207000008000b00ffff000007000100667700006c0002001400030076657468300000000000000000000000140003006261746164765f736c6176655f3100001400030076657468305f766972745f77696669001400030070696d367265673100000000000000000800010002119371e63d351c42fc8a000700080001000500050008000500ffffff7f648150c4ceaa7dd1a0d0d475cf2ad4f3edd8ad2f40680663047205957135710a8568f4f2be375119aba03c6339236c72fcc387fa25a49b2caad6c4362b117c0cb1ab62d1266265173d5e81529e3038840fb985a64a3fc2e74e1c03b7168b9efdb16c2780d254b05444bb2e701aabbc2bf3e9f4ea99dc25aaa1b6b6593e8878ae7525beafd4a0b4fb32180c485a17dc8ba9409d4bece6d7f8512d9b996a912da234cace74de11499d7abe9606"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x2, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) [ 905.454690] (unnamed net_device) (uninitialized): HSR: Slave2 device not specified 13:10:13 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x33, 0x0, 0x118) 13:10:13 executing program 2: r0 = socket(0x11, 0xa, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002040)={0x0, 0x0, &(0x7f0000002000)={0x0}}, 0x0) 13:10:13 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, 0x0) 13:10:13 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f0000002300)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000000f00)={0xd04, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_WOL_MODES={0xe8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0xad, 0x5, "295b643b8d20655915e3373c6ed54f1e50e3e17c31297a689a016d3aa65313a40bef50672a72897d4e5c093209b76ec4b8b69f604681d6d343a19325cd206245aab0fa7a8764c72729b3aecf66aa251443d87736fd3548aa6ee6d5a88f2cc4dee10c6ab37a17a809e4a9735284e0d95dbe0c8d0365d74e0f2046f96a92e585c0cacd21e7414a7c955c3de58453f7d5fb4589781e6c7b0b6476ac62dd2490f9e3b48b8ee5ecc58a9de8"}, @ETHTOOL_A_BITSET_VALUE={0x32, 0x4, "e4d0565e941a316b040f02a0af04ba5001173106fc25f82ce745c88b56b20830c5256cea7f1ae4023842bd5b6c79"}]}, @ETHTOOL_A_WOL_HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg\x00'}]}, @ETHTOOL_A_WOL_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0x29, 0x3, "a0df1d6844e6cb899f62686b3460137ed44bf033bcc9c21e4053a9441f6f228c0b0692e0ab"}, @ETHTOOL_A_WOL_MODES={0x178, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, 'syz'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, ':}\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x75, 0x5, "0be29a3f3ecf5fc87e017ea35b339764c13998a60b80eb7de7452e885a3f0c7c2bd12040983621c5ce4decd4b4ade0a66635f40e47b6225d7ce6ad7485fc66a6a2a841e4f6f7671f04ffa1e912e513cc49bc9a8ab7aa0437ea5dfb86d955f1e9764911948fc54e0cf5b04a48a000fe8c16"}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_BITS={0x14, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}, @ETHTOOL_A_BITSET_MASK={0x69, 0x5, "d91785b4e4be4d27a8b85916c45cf1a67204292a08a2d77707d063009db278fcb54bf1afc74f20d64879ffbea0e362b1fd8c3ae73e76e75c58d1105494b25f5ccf1c7e1a80a15eb8235ddc482782229e047704c43e31f0a203af82f07c031fbd41edc8b669"}]}, @ETHTOOL_A_WOL_MODES={0x9f4, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0xd, 0x5, "d36e60e93ac66b959c"}, @ETHTOOL_A_BITSET_VALUE={0x9dd, 0x4, "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"}]}]}, 0xd04}, 0x1, 0x0, 0x0, 0x4830}, 0x40000) 13:10:13 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) 13:10:13 executing program 0: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="95") sched_rr_get_interval(0x0, &(0x7f0000000200)) 13:10:13 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x3, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) [ 905.604843] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.4'. [ 905.604949] (unnamed net_device) (uninitialized): HSR: Slave1 device not specified [ 905.727363] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.4'. [ 905.728647] (unnamed net_device) (uninitialized): HSR: Slave1 device not specified 13:10:14 executing program 2: capset(&(0x7f0000000180)={0x19980330}, &(0x7f00000001c0)) syz_open_procfs(0x0, &(0x7f0000000000)='io\x00') 13:10:14 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x4b, 0x0, 0x118) 13:10:14 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={@mcast2, 0x0, r2}) 13:10:14 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r0, &(0x7f0000000000)='\a', 0x1, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}, 0x1c) 13:10:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x208e24b) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) (async) preadv(0xffffffffffffffff, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) (async) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000001600)={0x0, "48006cf0a81704e3c7c90110455edcd5"}) (async) perf_event_open(&(0x7f0000000100)={0x7, 0x80, 0x5a, 0x5, 0x2, 0x1, 0x0, 0x7, 0x40248, 0x9, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0x0, 0x5}, 0x201, 0x0, 0x8, 0x7, 0x7, 0x8, 0x101, 0x0, 0x80, 0x0, 0x400}, 0x0, 0x3, 0xffffffffffffffff, 0x8) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) (async) pipe(&(0x7f0000000080)={0xffffffffffffffff}) splice(r1, &(0x7f00000001c0), 0xffffffffffffffff, &(0x7f00000008c0)=0x1, 0x9, 0x0) (async) write$binfmt_script(r0, &(0x7f0000000ac0)={'#! ', './file1/file0', [{}, {0x20, 'ramfs\x00'}], 0xa, "60d65b39200fd5b99e53df8685d41fc7e3426855e3092eae555e900659412d7970bed0313a4ed3c580982d3981c62e9a3c035fb1404387eee3bbe81fafda07"}, 0x58) (async) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r3) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000006c0), 0x2, &(0x7f0000000700)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@posixacl}, {@loose}], [{@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, ',{*-$(+'}}, {@obj_type={'obj_type', 0x3d, '@![%#'}}, {@fowner_gt={'fowner>', r3}}]}}) (async) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) (async) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) (async) r6 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r6, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r7, 0x0) (async) newfstatat(0xffffffffffffff9c, &(0x7f0000003640)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) statx(r5, &(0x7f0000003500)='./file1\x00', 0x2000, 0x40, &(0x7f0000003540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) read$FUSE(r4, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) (async) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64=r8, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="10666f776e657235", @ANYRESDEC=r12, @ANYRESHEX=r9]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)={{}, {0x1, 0x2}, [{0x2, 0x5}, {0x2, 0x5}, {0x2, 0x5, 0xee00}, {}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2}, {0x2, 0x8, 0xee00}, {}, {0x2, 0x5}, {0x2, 0x4, r7}], {0x4, 0x2}, [{0x8, 0x4, r10}, {0x8, 0x5, r11}, {0x8, 0x3, r11}, {0x8, 0x1, 0xee01}, {}, {0x8, 0x7, 0xffffffffffffffff}, {0x8, 0x6, r12}, {0x8, 0x2, r13}], {0x10, 0x4}, {0x20, 0x5}}, 0xb4, 0x3) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) (async) fstat(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)={0x78, 0x15, 0x400, 0x70bd29, 0x25dfdbff, "", [@generic, @nested={0x67, 0x57, 0x0, 0x1, [@typed={0x14, 0x30, 0x0, 0x0, @ipv6=@ipv4={'\x00', '\xff\xff', @local}}, @generic="c39617b551f4abcc83f71064a428c2bb31407d05d283c9585a938d4c082ed76323d7d29a2feeef24cef5ef151616a302f97140c6ef5c8658452d55037221dcecd97b8ae9eff80c8778fc3bbb592314"]}]}, 0x78}, {&(0x7f0000000200)={0x1d4, 0x26, 0x2, 0x70bd25, 0x25dfdbfb, "", [@generic="66771e713aa3cba39b6e3e9c5b0dc14c56cbdcc376ac3203bfba832f12fdd9ad65542ec64f3a411b9a0b6efe91eaebb35402798ea6a7b84be3f4d35d1f79aa3a6834bf00fc98fe1bcaba10100309e4548fd3712bb0d1efba0feb62f3cb249ec4d5a0395b48f91bcfcf097c5f8a18d967b7832a53d3707688827d3e5a552c67545fd4cab6252ab70efa2ee63556eab08dd2e370e6fcf387d88682da01d86e8d12a79bf0b70e", @typed={0x8, 0x43, 0x0, 0x0, @u32=0x3}, @nested={0x10b, 0x8e, 0x0, 0x1, [@typed={0x8, 0x65, 0x0, 0x0, @u32=0x80000000}, @typed={0x8, 0x6a, 0x0, 0x0, @fd}, @generic="0641a96c33065cdbd0cd4f29d7ef55b6c353ef01deb720db24afc672ac4cc7c4916d999b14fae920c06009d88c8be7b6f37f96fefe482b2e4540216ef5b5cb7290873187bdfb68e34bb2b4e9bb6c052b642d264ca4732aa8ca3e55a35aafc8ca370af955dfd5c01ed7a7aa63e37526be76b5066b5538364f08c728264243b22a8883aa6e8131a98244e0409c746f121de1ecc0462da995e3785966317aab1e7f63509c83aef7d00fbece33df1443dd442d30b93843ca00d574041ca8703610ec93869f6504a46205ba935daefe3fc021164a226b4ff9dcdc9e546c8a6be0f9302b91bd1a0990721f9191219a30e6beb61b476bc78bd4ef"]}, @typed={0x8, 0x2c, 0x0, 0x0, @ipv4=@dev={0xac, 0x14, 0x14, 0xc}}]}, 0x1d4}], 0x2, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r3, r12}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r14, r15}}}], 0x78, 0x20004894}, 0x810) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:10:14 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x5, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:10:14 executing program 1: r0 = gettid() sched_rr_get_interval(r0, &(0x7f00000000c0)) 13:10:14 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f0000002300)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000000f00)={0xd04, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_WOL_MODES={0xe8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0xad, 0x5, "295b643b8d20655915e3373c6ed54f1e50e3e17c31297a689a016d3aa65313a40bef50672a72897d4e5c093209b76ec4b8b69f604681d6d343a19325cd206245aab0fa7a8764c72729b3aecf66aa251443d87736fd3548aa6ee6d5a88f2cc4dee10c6ab37a17a809e4a9735284e0d95dbe0c8d0365d74e0f2046f96a92e585c0cacd21e7414a7c955c3de58453f7d5fb4589781e6c7b0b6476ac62dd2490f9e3b48b8ee5ecc58a9de8"}, @ETHTOOL_A_BITSET_VALUE={0x31, 0x4, "e4d0565e941a316b040f02a0af04ba5001173106fc25f82ce745c88b56b20830c5256cea7f1ae4023842bd5b6c"}]}, @ETHTOOL_A_WOL_HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg\x00'}]}, @ETHTOOL_A_WOL_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0x2b, 0x3, "a0df1d6844e6cb899f62686b3460137ed44bf033bcc9c21e4053a9441f6f228c0b0692e0abba8f"}, @ETHTOOL_A_WOL_MODES={0x178, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, 'syz'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, ':}\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x10000}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x70e}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffffffff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x75, 0x5, "0be29a3f3ecf5fc87e017ea35b339764c13998a60b80eb7de7452e885a3f0c7c2bd12040983621c5ce4decd4b4ade0a66635f40e47b6225d7ce6ad7485fc66a6a2a841e4f6f7671f04ffa1e912e513cc49bc9a8ab7aa0437ea5dfb86d955f1e9764911948fc54e0cf5b04a48a000fe8c16"}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_BITS={0x14, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}, @ETHTOOL_A_BITSET_MASK={0x69, 0x5, "d91785b4e4be4d27a8b85916c45cf1a67204292a08a2d77707d063009db278fcb54bf1afc74f20d64879ffbea0e362b1fd8c3ae73e76e75c58d1105494b25f5ccf1c7e1a80a15eb8235ddc482782229e047704c43e31f0a203af82f07c031fbd41edc8b669"}]}, @ETHTOOL_A_WOL_MODES={0x9f4, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0xd, 0x5, "d36e60e93ac66b959c"}, @ETHTOOL_A_BITSET_VALUE={0x9dd, 0x4, "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"}]}]}, 0xd04}, 0x1, 0x0, 0x0, 0x4830}, 0x40000) 13:10:14 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f0000002300)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000000f00)={0xd04, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_WOL_MODES={0xe8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0xad, 0x5, "295b643b8d20655915e3373c6ed54f1e50e3e17c31297a689a016d3aa65313a40bef50672a72897d4e5c093209b76ec4b8b69f604681d6d343a19325cd206245aab0fa7a8764c72729b3aecf66aa251443d87736fd3548aa6ee6d5a88f2cc4dee10c6ab37a17a809e4a9735284e0d95dbe0c8d0365d74e0f2046f96a92e585c0cacd21e7414a7c955c3de58453f7d5fb4589781e6c7b0b6476ac62dd2490f9e3b48b8ee5ecc58a9de8"}, @ETHTOOL_A_BITSET_VALUE={0x32, 0x4, "e4d0565e941a316b040f02a0af04ba5001173106fc25f82ce745c88b56b20830c5256cea7f1ae4023842bd5b6c79"}]}, @ETHTOOL_A_WOL_HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg\x00'}]}, @ETHTOOL_A_WOL_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0x2b, 0x3, "a0df1d6844e6cb899f62686b3460137ed44bf033bcc9c21e4053a9441f6f228c0b0692e0abba8f"}, @ETHTOOL_A_WOL_MODES={0x178, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, 'syz'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, ':}\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x10000}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x70e}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffffffff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x76, 0x5, "0be29a3f3ecf5fc87e017ea35b339764c13998a60b80eb7de7452e885a3f0c7c2bd12040983621c5ce4decd4b4ade0a66635f40e47b6225d7ce6ad7485fc66a6a2a841e4f6f7671f04ffa1e912e513cc49bc9a8ab7aa0437ea5dfb86d955f1e9764911948fc54e0cf5b04a48a000fe8c16a3"}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_BITS={0x14, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}, @ETHTOOL_A_BITSET_MASK={0x69, 0x5, "d91785b4e4be4d27a8b85916c45cf1a67204292a08a2d77707d063009db278fcb54bf1afc74f20d64879ffbea0e362b1fd8c3ae73e76e75c58d1105494b25f5ccf1c7e1a80a15eb8235ddc482782229e047704c43e31f0a203af82f07c031fbd41edc8b669"}]}, @ETHTOOL_A_WOL_MODES={0x9f4, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0xd, 0x5, "d36e60e93ac66b959c"}, @ETHTOOL_A_BITSET_VALUE={0x9dd, 0x4, "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"}]}]}, 0xd04}, 0x1, 0x0, 0x0, 0x4830}, 0x40000) 13:10:14 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x6, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:10:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x30, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:10:14 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0x2, &(0x7f0000000300)=@raw=[@map_idx], &(0x7f0000000340)='GPL\x00', 0x2, 0x75, &(0x7f0000000380)=""/117, 0x41100, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x0, 0xd, 0x3, 0x8b}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[0x1]}, 0x80) 13:10:14 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0x3, &(0x7f0000000300)=@raw=[@map_idx, @ldst], &(0x7f0000000340)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[0x1]}, 0x80) 13:10:14 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmsg$inet6(r0, &(0x7f00000002c0)={&(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, 0x1c, &(0x7f0000000180)=[{&(0x7f0000000040)="ec", 0x1}], 0x1}, 0x0) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, &(0x7f00000001c0)=ANY=[], 0x118) 13:10:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x30, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x30, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) 13:10:14 executing program 1: capset(&(0x7f0000001180), &(0x7f00000011c0)={0x0, 0x7fffffff, 0x0, 0x0, 0xab, 0xa4}) syz_clone(0x45102000, &(0x7f0000000000)="79af0b9dedec4f6926ef7bcb38ea88c941a30b3351b885bfd1c364ca8a94046552ef27c3c80e7072f3e44fbce3e168ef80c6a830a38fda13c573f286c5708113da81e8978a3a8c7ebff412ca1a697009f6880b6230ac4eecf664e74f0c08aadf5164d6bbae7dac025a7695020de9fa6741ca7523e8ce6af988593545e44ef0de0dda2900ba513ed477ec15c7b3f47c0d84e8", 0x92, 0x0, 0x0, &(0x7f0000000180)="9b313c21221fd5fbdf8c7867e6ac313f2699100f4d73827d1853bed7e41ed04176b9d189360f29bd2a2d57adbe234acde6b0c6d6f5c22bab44ec5e011a51854a9bbdcf48a0c7eb63c2a89945c4ebb7cdc38abf7f6e958c5417396cb9f0d498ed7b4715ecbf40c3204488ed16b322b8a3eb1eae952a3ce21bcf2bcbff0a12e4a699f67255a5f11c09fe99fe191ad9a05c0aa9429990d483abebc3199434a590b17a1afcafa006b383957e5b0ab14a") syz_clone(0x0, &(0x7f0000000240)="d39d9b2b6dc28417f71fe904f19b844ec3d7f400a3e0fa016cdd7828dace9c58f5cabf1e9e4e", 0x26, 0x0, 0x0, &(0x7f0000000280)="00ba978cbd") openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/asound/seq/timer\x00', 0x0, 0x0) capset(&(0x7f0000001180)={0x20080522}, 0x0) [ 906.133360] IPVS: ftp: loaded support on port[0] = 21 13:10:14 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000140)=ANY=[], 0x8) sendmsg$inet6(r0, &(0x7f00000002c0)={&(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, 0x1c, &(0x7f0000000180)=[{&(0x7f0000000040)="ec", 0x1}], 0x1}, 0x40) 13:10:14 executing program 0: request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000100)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) 13:10:14 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x7, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:10:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x30, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x30, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) 13:10:14 executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='qrtr_ns_service_announce_new\x00'}, 0xfffffffffffffdf8) 13:10:14 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f0000002300)={&(0x7f0000000e00), 0xc, 0x0}, 0x0) 13:10:15 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000200)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x77, r1}) setsockopt$inet6_mreq(r0, 0x88, 0x0, &(0x7f0000000080)={@dev}, 0x14) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x54, r3, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x8800}, 0x4000894) 13:10:15 executing program 3: r0 = socket$igmp6(0xa, 0x3, 0x2) ioctl$sock_inet6_SIOCDELRT(r0, 0x541b, &(0x7f0000000000)={@ipv4={'\x00', '\xff\xff', @multicast2}, @empty, @loopback}) 13:10:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xab5b}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 906.833436] validate_nla: 5 callbacks suppressed [ 906.833446] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 13:10:15 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f0000001880), 0x0, 0x0) 13:10:15 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x9, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:10:15 executing program 0: ioprio_set$pid(0x0, 0x0, 0x6003) 13:10:15 executing program 1: r0 = socket$inet6_sctp(0xa, 0x3, 0x84) sendto$inet6(r0, &(0x7f0000000040)='j', 0x1, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) 13:10:15 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='mountinfo\x00') 13:10:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xab5b}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xab5b}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) 13:10:15 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x33, &(0x7f0000000080)={@dev}, 0x14) 13:10:15 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000300)={&(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=ANY=[], 0x98}, 0x0) 13:10:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xab5b}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:10:15 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x6, &(0x7f0000000080)={@dev}, 0x14) 13:10:15 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x10, &(0x7f0000000080)={@dev}, 0x14) [ 907.084554] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 13:10:15 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x17, &(0x7f0000000080)={@dev}, 0x14) [ 907.128169] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 13:10:15 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001200)={&(0x7f0000000000)={0xa, 0x4e24, 0x0, @remote}, 0x1c, 0x0}, 0x0) [ 907.237766] syz_tun: This device is already a HSR slave. 13:10:15 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="0e00000009000d00ffff000008000b008000000008000b0008000000060005003f060014060005002207000008000b00ffff000007000100667700006c0002001400030076657468300000000000000000000000140003006261746164765f736c6176655f3100001400030076657468305f766972745f77696669001400030070696d367265673100000000000000000800010002119371e63d351c42fc8a000700080001000500050008000500ffffff7f648150c4ceaa7dd1a0d0d475cf2ad4f3edd8ad2f40680663047205957135710a8568f4f2be375119aba03c6339236c72fcc387fa25a49b2caad6c4362b117c0cb1ab62d1266265173d5e81529e3038840fb985a64a3fc2e74e1c03b7168b9efdb16c2780d254b05444bb2e701aabbc2bf3e9f4ea99dc25aaa1b6b6593e8878ae7525beafd4a0b4fb32180c485a17dc8ba9409d4bece6d7f8512d9b996a912da234cace74de11499d7abe9606"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0xa, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:10:15 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0xa, 0x4e24, 0x0, @mcast1}, 0x1b, 0x0, 0x0, &(0x7f0000000540)=[@dontfrag={{0x14}}], 0x18}, 0x0) 13:10:15 executing program 3: r0 = socket$inet(0x2, 0x3, 0x4) getsockopt$inet_pktinfo(r0, 0x0, 0x13, 0x0, &(0x7f0000000040)) 13:10:15 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000002940)=[{{&(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10, 0x0}}, {{&(0x7f0000001400)={0x2, 0x4e20, @dev}, 0x10, 0x0, 0x0, &(0x7f0000002840)=[@ip_retopts={{0x14, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4}]}}}], 0x18}}], 0x2, 0x0) 13:10:15 executing program 1: r0 = socket$inet(0x2, 0x3, 0x4) getsockopt$inet_pktinfo(r0, 0x0, 0xe, 0x0, &(0x7f0000000040)) 13:10:15 executing program 5: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r0, 0x200, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4) r1 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r1, &(0x7f0000000000/0x13000)=nil, 0x0) shmctl$SHM_LOCK(r1, 0xb) r2 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x0) shmctl$SHM_LOCK(r2, 0xb) shmat(r2, &(0x7f0000157000/0x4000)=nil, 0x6000) shmat(r2, &(0x7f000016c000/0x2000)=nil, 0x1000) shmget$private(0x0, 0x1000, 0x54000000, &(0x7f0000ffe000/0x1000)=nil) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file0\x00'}) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x38, r4, 0x2, 0x70bd2a, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0xfffffffb, 0x41}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x38}, 0x1, 0x0, 0x0, 0x90}, 0x4044844) r5 = shmget$private(0x0, 0x2000, 0x2a000102, &(0x7f00002c8000/0x2000)=nil) shmat(r5, &(0x7f0000120000/0x4000)=nil, 0x2000) shmat(r1, &(0x7f0000ffe000/0x2000)=nil, 0x5000) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:10:15 executing program 5: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r0, 0x200, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4) (async) r1 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r1, &(0x7f0000000000/0x13000)=nil, 0x0) shmctl$SHM_LOCK(r1, 0xb) (async) r2 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x0) (async) shmctl$SHM_LOCK(r2, 0xb) (async) shmat(r2, &(0x7f0000157000/0x4000)=nil, 0x6000) (async) shmat(r2, &(0x7f000016c000/0x2000)=nil, 0x1000) (async) shmget$private(0x0, 0x1000, 0x54000000, &(0x7f0000ffe000/0x1000)=nil) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file0\x00'}) (async) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x38, r4, 0x2, 0x70bd2a, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0xfffffffb, 0x41}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x38}, 0x1, 0x0, 0x0, 0x90}, 0x4044844) (async) r5 = shmget$private(0x0, 0x2000, 0x2a000102, &(0x7f00002c8000/0x2000)=nil) shmat(r5, &(0x7f0000120000/0x4000)=nil, 0x2000) (async, rerun: 64) shmat(r1, &(0x7f0000ffe000/0x2000)=nil, 0x5000) (rerun: 64) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:10:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000340)={&(0x7f0000000100), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c}, 0x1b}}, 0x0) 13:10:15 executing program 3: r0 = socket$inet(0x2, 0x3, 0x4) getsockopt$inet_pktinfo(r0, 0x0, 0x30, 0x0, &(0x7f0000000040)) 13:10:15 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) 13:10:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[], 0x24}}, 0x0) [ 907.599732] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 907.639418] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 13:10:15 executing program 5: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r0, 0x200, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4) r1 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r1, &(0x7f0000000000/0x13000)=nil, 0x0) (async) shmctl$SHM_LOCK(r1, 0xb) r2 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x0) (async) shmctl$SHM_LOCK(r2, 0xb) (async) shmat(r2, &(0x7f0000157000/0x4000)=nil, 0x6000) (async) shmat(r2, &(0x7f000016c000/0x2000)=nil, 0x1000) shmget$private(0x0, 0x1000, 0x54000000, &(0x7f0000ffe000/0x1000)=nil) (async) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file0\x00'}) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x38, r4, 0x2, 0x70bd2a, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0xfffffffb, 0x41}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x38}, 0x1, 0x0, 0x0, 0x90}, 0x4044844) r5 = shmget$private(0x0, 0x2000, 0x2a000102, &(0x7f00002c8000/0x2000)=nil) shmat(r5, &(0x7f0000120000/0x4000)=nil, 0x2000) (async) shmat(r1, &(0x7f0000ffe000/0x2000)=nil, 0x5000) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 907.734182] syz_tun: This device is already a HSR slave. 13:10:16 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0xb, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:10:16 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x43, &(0x7f0000000080)={@dev}, 0x14) 13:10:16 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001200)={&(0x7f0000000000)={0xa, 0x4e24, 0x0, @remote, 0x1}, 0x1c, &(0x7f0000001140)=[{&(0x7f0000000040)='M', 0x1}], 0x1}, 0x0) 13:10:16 executing program 3: r0 = socket$inet(0x2, 0x3, 0x4) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, 0x0) 13:10:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f0000000980)={&(0x7f0000000740)={0x10, 0x0, 0x7000000}, 0xc, &(0x7f0000000940)={&(0x7f00000007c0)={0x1c}, 0x1c}}, 0x0) 13:10:16 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x764}) 13:10:16 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x11, &(0x7f0000000080)={@dev}, 0x14) 13:10:16 executing program 5: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=ANY=[@ANYBLOB="3c00000024000b0f00000000e4ff000000000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000b00010064736d61726b00000c0002000600010020"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB='<\x00\x00\x00,\x00\'\r\x00'/20, @ANYRES32=r4, @ANYBLOB="0000000000000000030000000c0001006463696e646578000c0002000800050000000000118a3e84baefb1c2eda8f105f8f587db4d9955a218a000cf2ccad57ed86b001097322e21b638a5f4e8b0b11d5faa6b8226ace64baea374aa95ce821dddf991869ef05b25df9a8554b81583c05c1f3131a0489057d7e2493674681706bd9a3ea6562056"], 0x3c}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000d80)=@dellink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)={r4, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}}, 0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket(0x10, 0x803, 0x0) r7 = socket(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f00000000c0), r9) getsockname$packet(r9, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r10, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r7, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=ANY=[@ANYBLOB="3c00000024000b0f00000000e4ff000000000000", @ANYRES32=r10, @ANYBLOB="00000000ffffffff000000000b00010064736d61726b00000c0002000600010020"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=@newtfilter={0x3c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r10, {}, {}, {0x3}}, [@filter_kind_options=@f_tcindex={{0xc}, {0xc, 0x2, [@TCA_TCINDEX_SHIFT={0x8, 0x5}]}}]}, 0x3c}}, 0x0) r11 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000d80)=ANY=[@ANYBLOB="2000000011000100"/20, @ANYRES32=r10, @ANYBLOB="000000edb7474500"], 0x20}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000640)={&(0x7f0000000500)=@ipv4_getnetconf={0x24, 0x52, 0x1, 0x70bd26, 0x25dfdbfb, {}, [@NETCONFA_FORWARDING={0x8, 0x2, 0xfffffff8}, @NETCONFA_IFINDEX={0x8, 0x1, r10}]}, 0x24}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)=@gettfilter={0x44, 0x2e, 0x10, 0x70bd2a, 0x25dfdbfc, {0x0, 0x0, 0x0, r4, {0xfff2, 0xd}, {0x6, 0xf}, {0x5, 0xb}}, [{0x8, 0xb, 0x10001}, {0x8, 0xb, 0x3f}, {0x8, 0xb, 0x47b}, {0x8, 0xb, 0x8}]}, 0x44}, 0x1, 0x0, 0x0, 0x48090}, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$WPAN_SECURITY_LEVEL(r12, 0x0, 0x2, &(0x7f0000000380), &(0x7f00000003c0)=0x4) [ 907.900592] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 907.915928] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 13:10:16 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001200)={&(0x7f0000000000)={0xa, 0x4e24, 0x0, @remote}, 0x1c, &(0x7f0000001140)=[{&(0x7f0000000040)="4d861d2c599e71815caab924e23a0d651a52b68f5dad49111bdbb028b6e8619162eb0a78ca36a065fea6fdfd984f8a400bad8421c2769e3ee0ed3adc32c0a57de17c7eb0df559c404ecbaf6c9e7d0bfd30e906dca292af6a79", 0x59}, {&(0x7f00000000c0)="04504d97b14f5b773a7c0f170fc7e4c868cd9054a3b89610d2b925f7393579cadddccbc9f345853b61a132759376d23a904790b67a0a410850a9fb81e6bbb48b1519c381636f38563ecbfd07a3fcb96eda220cd8a958292c44cff9160dc63dad50cd7d25f67bad950a4c", 0x6a}, {&(0x7f0000000140)="da8450ea1167f968a669f65e39fe4189e801c9a1f0ab85aa43920b1a4f3625b7c47be480a69d649bb7a8c9cb1b2481de253c6232ec4b487d57ac7403592881068541e9ebd4946ae96b9bcc182f55e4aa7ea9f1d474b0fa0f49f62dfcf8335f92004a9938aa7a9298be02be20e9abdb19c7fdb5aadef5606cc115659b2c656872704e057c9c87b414cfa8e12aeb1753231839cdfb20d6515d9fcc9d918a96874e536c3d6513cc4c5e9ffd8c8f78235530fc53f0d9283f92983fbf8f69fd133a8339a7883ccc3b7c736ac7181a6d21ccdd9ae7f0db5f7dcc36822de2f68ac185df3231ab659f60f83b902515b1780d135c335b5279bd950ec75aac10f1b6796e5afeecb093ebf822f6e20bc55da02b62ab12d61b96ec83753fc9607eaaa5db6be163d1c3af2c651d565c8e7d757a08d979f5fc6e6bafe29abe24de968ad00238c9f46cf886ff8abacd6eb41331b90ce33de11fab38f85c0c66ce0b8608ff4084d15476414762fd7c70caf848b38345a7f943afd8b590ca3717e23d68b36d1c9d974949deba070b7f889bdb584dd3b259cc3de30c20d6e90ed241294752ac48c20d48fa74da603a2907ecfd7ae6a2a57238770a549ef776b756d769342df477ca522d95a27a1a34ec16b902362ea7dd00755f6c672eb9adb7fb24491cb55abbed7b4a3964fbd99067d31225bf92610394e8e59d35fcb336114897076091c18f1cda41fbc4200a1239c65e6b7ec916adb2a4d4c9c98c5eb4ec687b1d6d668f16bed87e4c676226a3fe8080d2b028a526c22796efe7dd72aec98c8eb3cd497381acd53364d79177888bf2e750236584e70fff06a2bdc6042480367b04be5f5f459cbdc1320abd9ff2c5b3cfc469bf0641c96dd31d1832f3e8a7c002d61398eaa9fd6c7427307f52f566eebfab0983d8effbc2d3ac7bca054f89d63410dfb27555b8de0d27cfe1b441d2796d0e4276a790f340b73acfe88b5a4972fd19f97319023772821043ff19890e765896891dd8d091914fe340806f7aa1ae2b1e9d6293105071c465e803b66ec287a3057408cdaddf05b5173585d22aed07a0afb74928e852e854220348c9ff95b0462497d9b516bf192d31d5ec5f9caa7886eed57cdc5130ec4b5c0596c8db28562f9438da885cf359bf6e27c6e0f3d981ad63c83ae92a05f5584254863d6bea59b2a364465686dddf3185dd95268550e69ef841d9def3410eebb735a8bf261b624240625f8ac1f0ae94dcc9f74115318e134e6e0e9b72232d3f96cd4497103e044f804b8da0c322f268e392df61edb38acd5536d98510b8ef2fcc327b54c01df88b484298be59929afeb860c83ec1a7a084f41641b62c6247b7f88132e608cb146b46cd7db8c1fb7a215bc6d3ca50a1f1b3c14af63a7567dbda2e9d478cef033c89846c7115ecdc8e55d185bfecc44004b0ea5720518fbb280029f296bffc32d9041a9659ee9b20c9f3a9c0fabf80556d197a518c518069edafd0abef204cb3647abd1c7c5addc69058b38bbf4480d64ca04c49929676d83d93246a005647c7eba66cf6293d7e12ea928d3f07bd4fb48160123526d573611fdaf5a6e8a75f4cae521dc15887919815d7b544945dab8e9780afa7f275499a6efbfb3fef9a3f95b260c37714355d99ba1c267440f3619dccb71cc9be0f4c9956563f740968ede09adaf0bbbac0950fbe91ec93379fd5f799fc4aa7a1dd5b1654cc087600ba03747765eeb41d8280993565cf2a751a8ec8ceea7f", 0x4da}], 0x3, &(0x7f0000001240)=[@dstopts_2292={{0x28, 0x29, 0x4, {0x0, 0x1, '\x00', [@ra, @jumbo]}}}], 0x28}, 0x0) 13:10:16 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x4c, 0x0, 0x0) 13:10:16 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000040)={@dev={0xfe, 0x80, '\x00', 0x44}}, 0x14) 13:10:16 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f00000000c0)) [ 908.017980] syz_tun: This device is already a HSR slave. [ 908.057342] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 13:10:16 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@private0}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="c000"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xc0}}, 0x20000044) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000000c0), 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_int(r5, 0x107, 0x6, &(0x7f0000000500)=0x4000, 0x4) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r1, 0x29, 0x7, 0x80, 0xfff, 0x4a, @private2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0x8000, 0x7, 0x6}}) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="38000000720010002dbd7000fedbdf2507000000c7e2098ebd438973353bf50e98781af6717b6cda75ee25d5d5a2df0ad45a8f5388d624d51284d2e6005b0000000000f14f24bdc7fce94d77c51d1c9ce0c7a5a9d48c2e0f41e318a8029ff67597bb13651087308b792007ae6a1c691d147a3e6900a8cc765b100d06", @ANYRES32=r7, @ANYBLOB="0800010001000000080001000100000008000100000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48b5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000080000000002e2f66696c653000"]) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r5) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r9, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000b00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="c80000002c00000125bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="0b000300020005000800100006000500013000080a000100726f7574650000004800020008000300cd000000080001001000ffff1c0005000c00090002000000000000000c0009000200000000000000080001000f00f2ff08000100f3ff100008000300b0000000060005001f08000008000100627066003800020008000600", @ANYRES32, @ANYBLOB="080003006717010006000400030000001c000500f23540030000000004003f98000000007410041f03000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8001}, 0x48011) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=@setlink={0x174, 0x13, 0x10, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x100a8, 0x8c00}, [@IFLA_VF_PORTS={0x11c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6f13c348989bd4081a168efd4a809564"}, @IFLA_PORT_VF={0x8, 0x1, 0x800}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xed45}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8d}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0b9e67c37a873b48580eb2e0873db370"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7f2b08c3c8bc3413c2881d3d1afe398b"}, @IFLA_PORT_PROFILE={0x8, 0x2, '&}#\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "534e347fca44e41563cab790cd1c87e8"}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xb5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xc}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5abf60c4698bee4eb9ccf41c28c0e598"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3dcecedbe33612100549c4c8bde12dc3"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}]}, {0x4}]}, @IFLA_MASTER={0x8}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40004546}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, @IFLA_LINKMODE={0x5, 0x11, 0x5}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x174}}, 0x44) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="44349719e3fc8dbc514c0262ee01bd3958082bb8a8d62fb4b1547f7163c1cc5a834787ee476dd8f6c26a34b741dd22b86ad28298be9113baf427f89f8d30718de01c35894144513d360f8ae31ce9d18343e7fcfdd5f6"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x84, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x66e99, 0x4040}, [@IFLA_LINKINFO={0x54, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x48, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x5}, @IFLA_HSR_MULTICAST_SPEC={0x5}, @IFLA_HSR_SLAVE2={0x8, 0x2, r12}, @IFLA_HSR_SLAVE1={0x10, 0x1, r14}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x8}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @broadcast}, @IFLA_HSR_SEQ_NR={0x6, 0x5, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x20000800) 13:10:16 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) sendmmsg$inet(r0, &(0x7f0000002200)=[{{&(0x7f0000000180)={0x2, 0x4e23, @loopback}, 0x10, 0x0}}], 0x1, 0x4010) 13:10:16 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_mreq(r0, 0x51, 0x0, 0x0, 0x0) 13:10:16 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000300)={&(0x7f0000000000)={0x2, 0x0, 0x0, @private1}, 0xf, 0x0, 0x0, &(0x7f0000000240)=ANY=[], 0x98}, 0x0) 13:10:16 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000002940)=[{{&(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10, &(0x7f0000001340)=[{0x0}, {0x0}, {&(0x7f0000001140)='Y', 0x1}], 0x3}}, {{&(0x7f0000001400)={0x2, 0x4e20, @dev}, 0x10, 0x0}}], 0x2, 0x0) 13:10:16 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/hid_logitech_hidpp', 0x0, 0x0) mkdirat$cgroup(r0, &(0x7f0000000040)='syz1\x00', 0x1ff) 13:10:16 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1e, &(0x7f0000000080)={@dev}, 0x14) [ 908.255058] ================================================================== [ 908.262841] BUG: KASAN: use-after-free in tc_chain_fill_node+0x7f5/0x860 [ 908.269691] Read of size 8 at addr ffff8880af03cdc0 by task syz-executor.5/620 [ 908.277049] [ 908.278694] CPU: 0 PID: 620 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 908.286404] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 908.295768] Call Trace: [ 908.298375] dump_stack+0x1fc/0x2ef [ 908.302024] print_address_description.cold+0x54/0x219 [ 908.307316] kasan_report_error.cold+0x8a/0x1b9 [ 908.311997] ? tc_chain_fill_node+0x7f5/0x860 [ 908.316506] __asan_report_load8_noabort+0x88/0x90 [ 908.321446] ? tc_chain_fill_node+0x7f5/0x860 [ 908.325958] tc_chain_fill_node+0x7f5/0x860 [ 908.330300] ? tfilter_notify+0x270/0x270 [ 908.334625] ? memset+0x20/0x40 [ 908.337925] tc_chain_notify+0x100/0x1f0 [ 908.342005] __tcf_chain_put+0xe5/0x4b0 [ 908.346002] tc_new_tfilter+0x729/0x16c0 [ 908.350087] ? tcf_chain_tp_remove+0x2c0/0x2c0 [ 908.354687] ? __mutex_lock+0x368/0x1190 [ 908.358773] ? perf_trace_lock_acquire+0xef/0x530 [ 908.363658] ? apparmor_capable+0x147/0x750 [ 908.368077] ? rtnetlink_rcv_msg+0x3fe/0xb80 [ 908.372497] ? mutex_trylock+0x1a0/0x1a0 [ 908.376595] ? tcf_chain_tp_remove+0x2c0/0x2c0 [ 908.381362] rtnetlink_rcv_msg+0x453/0xb80 [ 908.385607] ? rtnl_calcit.isra.0+0x430/0x430 [ 908.390110] ? __netlink_lookup+0x3fc/0x730 [ 908.394442] ? HARDIRQ_verbose+0x10/0x10 [ 908.398514] ? lock_downgrade+0x720/0x720 [ 908.402674] ? check_preemption_disabled+0x41/0x280 [ 908.407708] netlink_rcv_skb+0x160/0x440 [ 908.411778] ? rtnl_calcit.isra.0+0x430/0x430 [ 908.416290] ? netlink_ack+0xae0/0xae0 [ 908.420201] netlink_unicast+0x4d5/0x690 [ 908.424292] ? netlink_sendskb+0x110/0x110 [ 908.428625] ? _copy_from_iter_full+0x229/0x7c0 [ 908.433307] ? __phys_addr_symbol+0x2c/0x70 [ 908.437642] ? __check_object_size+0x17b/0x3e0 [ 908.442232] netlink_sendmsg+0x6c3/0xc50 [ 908.446302] ? aa_af_perm+0x230/0x230 [ 908.450101] ? nlmsg_notify+0x1f0/0x1f0 [ 908.454081] ? kernel_recvmsg+0x220/0x220 [ 908.458244] ? nlmsg_notify+0x1f0/0x1f0 [ 908.462220] sock_sendmsg+0xc3/0x120 [ 908.465935] ___sys_sendmsg+0x7bb/0x8e0 [ 908.469906] ? copy_msghdr_from_user+0x440/0x440 [ 908.474663] ? __fget+0x32f/0x510 [ 908.478108] ? lock_downgrade+0x720/0x720 [ 908.482246] ? check_preemption_disabled+0x41/0x280 [ 908.487256] ? check_preemption_disabled+0x41/0x280 [ 908.492278] ? __fget+0x356/0x510 [ 908.495732] ? do_dup2+0x450/0x450 [ 908.499262] ? _copy_to_user+0xb8/0x100 [ 908.503228] ? __fdget+0x1d0/0x230 [ 908.506775] __x64_sys_sendmsg+0x132/0x220 [ 908.510998] ? __sys_sendmsg+0x1b0/0x1b0 [ 908.515054] ? __se_sys_futex+0x298/0x3b0 [ 908.519200] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 908.524576] ? trace_hardirqs_off_caller+0x6e/0x210 [ 908.529601] ? do_syscall_64+0x21/0x620 [ 908.533569] do_syscall_64+0xf9/0x620 [ 908.537364] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 908.542565] RIP: 0033:0x7f2c510b90c9 [ 908.546298] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 908.565191] RSP: 002b:00007f2c4f62b168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 908.572888] RAX: ffffffffffffffda RBX: 00007f2c511d8f80 RCX: 00007f2c510b90c9 [ 908.580158] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 [ 908.587429] RBP: 00007f2c51114ae9 R08: 0000000000000000 R09: 0000000000000000 [ 908.594694] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 908.601959] R13: 00007ffe3c8cfe3f R14: 00007f2c4f62b300 R15: 0000000000022000 [ 908.609228] [ 908.610841] Allocated by task 630: [ 908.614370] __kmalloc_node+0x4c/0x70 [ 908.618158] qdisc_alloc+0xb2/0xa40 [ 908.621772] qdisc_create+0xdc/0x1130 [ 908.625555] tc_modify_qdisc+0x50d/0x1a80 [ 908.629689] rtnetlink_rcv_msg+0x453/0xb80 [ 908.633909] netlink_rcv_skb+0x160/0x440 [ 908.637964] netlink_unicast+0x4d5/0x690 [ 908.642008] netlink_sendmsg+0x6c3/0xc50 [ 908.646056] sock_sendmsg+0xc3/0x120 [ 908.649753] ___sys_sendmsg+0x7bb/0x8e0 [ 908.653713] __x64_sys_sendmsg+0x132/0x220 [ 908.657933] do_syscall_64+0xf9/0x620 [ 908.661725] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 908.666895] [ 908.668507] Freed by task 630: [ 908.671689] kfree+0xcc/0x210 [ 908.674782] qdisc_destroy+0x501/0x790 [ 908.678654] dev_shutdown+0x2b2/0x490 [ 908.682443] rollback_registered_many+0x6a4/0xe70 [ 908.687271] unregister_netdevice_many.part.0+0x1a/0x300 [ 908.692710] unregister_netdevice_many+0x36/0x50 [ 908.697456] rtnl_dellink+0x361/0x920 [ 908.701255] rtnetlink_rcv_msg+0x453/0xb80 [ 908.705477] netlink_rcv_skb+0x160/0x440 [ 908.709527] netlink_unicast+0x4d5/0x690 [ 908.713574] netlink_sendmsg+0x6c3/0xc50 [ 908.717633] sock_sendmsg+0xc3/0x120 [ 908.721338] ___sys_sendmsg+0x7bb/0x8e0 [ 908.725300] __x64_sys_sendmsg+0x132/0x220 [ 908.729520] do_syscall_64+0xf9/0x620 [ 908.733307] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 908.738474] [ 908.740094] The buggy address belongs to the object at ffff8880af03cd80 [ 908.740094] which belongs to the cache kmalloc-1024 of size 1024 [ 908.752912] The buggy address is located 64 bytes inside of [ 908.752912] 1024-byte region [ffff8880af03cd80, ffff8880af03d180) [ 908.764772] The buggy address belongs to the page: [ 908.769703] page:ffffea0002bc0f00 count:1 mapcount:0 mapping:ffff88813bff0ac0 index:0x0 compound_mapcount: 0 [ 908.779655] flags: 0xfff00000008100(slab|head) [ 908.784226] raw: 00fff00000008100 ffffea00025adb08 ffffea00025ffd88 ffff88813bff0ac0 [ 908.792102] raw: 0000000000000000 ffff8880af03c000 0000000100000007 0000000000000000 [ 908.799964] page dumped because: kasan: bad access detected [ 908.805656] [ 908.807268] Memory state around the buggy address: [ 908.812183] ffff8880af03cc80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 908.819528] ffff8880af03cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 908.826872] >ffff8880af03cd80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 908.834216] ^ [ 908.839655] ffff8880af03ce00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 908.846999] ffff8880af03ce80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 908.854349] ================================================================== [ 908.861689] Disabling lock debugging due to kernel taint [ 908.950062] Kernel panic - not syncing: panic_on_warn set ... [ 908.950062] [ 908.957463] CPU: 1 PID: 620 Comm: syz-executor.5 Tainted: G B 4.19.211-syzkaller #0 [ 908.966551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 908.975895] Call Trace: [ 908.978485] dump_stack+0x1fc/0x2ef [ 908.982114] panic+0x26a/0x50e [ 908.985302] ? __warn_printk+0xf3/0xf3 [ 908.989190] ? preempt_schedule_common+0x45/0xc0 [ 908.993945] ? ___preempt_schedule+0x16/0x18 [ 908.998350] ? trace_hardirqs_on+0x55/0x210 [ 909.002675] kasan_end_report+0x43/0x49 [ 909.006646] kasan_report_error.cold+0xa7/0x1b9 [ 909.011310] ? tc_chain_fill_node+0x7f5/0x860 [ 909.015829] __asan_report_load8_noabort+0x88/0x90 [ 909.020758] ? tc_chain_fill_node+0x7f5/0x860 [ 909.025248] tc_chain_fill_node+0x7f5/0x860 [ 909.029606] ? tfilter_notify+0x270/0x270 [ 909.033772] ? memset+0x20/0x40 [ 909.037063] tc_chain_notify+0x100/0x1f0 [ 909.041129] __tcf_chain_put+0xe5/0x4b0 [ 909.045118] tc_new_tfilter+0x729/0x16c0 [ 909.049200] ? tcf_chain_tp_remove+0x2c0/0x2c0 [ 909.053795] ? __mutex_lock+0x368/0x1190 [ 909.057859] ? perf_trace_lock_acquire+0xef/0x530 [ 909.062715] ? apparmor_capable+0x147/0x750 [ 909.067052] ? rtnetlink_rcv_msg+0x3fe/0xb80 [ 909.071479] ? mutex_trylock+0x1a0/0x1a0 [ 909.075550] ? tcf_chain_tp_remove+0x2c0/0x2c0 [ 909.080147] rtnetlink_rcv_msg+0x453/0xb80 [ 909.084393] ? rtnl_calcit.isra.0+0x430/0x430 [ 909.088898] ? __netlink_lookup+0x3fc/0x730 [ 909.093235] ? HARDIRQ_verbose+0x10/0x10 [ 909.097313] ? lock_downgrade+0x720/0x720 [ 909.101463] ? check_preemption_disabled+0x41/0x280 [ 909.106470] netlink_rcv_skb+0x160/0x440 [ 909.110518] ? rtnl_calcit.isra.0+0x430/0x430 [ 909.114999] ? netlink_ack+0xae0/0xae0 [ 909.118879] netlink_unicast+0x4d5/0x690 [ 909.122938] ? netlink_sendskb+0x110/0x110 [ 909.127157] ? _copy_from_iter_full+0x229/0x7c0 [ 909.131813] ? __phys_addr_symbol+0x2c/0x70 [ 909.136118] ? __check_object_size+0x17b/0x3e0 [ 909.140680] netlink_sendmsg+0x6c3/0xc50 [ 909.144725] ? aa_af_perm+0x230/0x230 [ 909.148506] ? nlmsg_notify+0x1f0/0x1f0 [ 909.152460] ? kernel_recvmsg+0x220/0x220 [ 909.156591] ? nlmsg_notify+0x1f0/0x1f0 [ 909.160557] sock_sendmsg+0xc3/0x120 [ 909.164253] ___sys_sendmsg+0x7bb/0x8e0 [ 909.168214] ? copy_msghdr_from_user+0x440/0x440 [ 909.172952] ? __fget+0x32f/0x510 [ 909.176388] ? lock_downgrade+0x720/0x720 [ 909.180519] ? check_preemption_disabled+0x41/0x280 [ 909.185523] ? check_preemption_disabled+0x41/0x280 [ 909.190521] ? __fget+0x356/0x510 [ 909.193962] ? do_dup2+0x450/0x450 [ 909.197480] ? _copy_to_user+0xb8/0x100 [ 909.201436] ? __fdget+0x1d0/0x230 [ 909.204957] __x64_sys_sendmsg+0x132/0x220 [ 909.209172] ? __sys_sendmsg+0x1b0/0x1b0 [ 909.213228] ? __se_sys_futex+0x298/0x3b0 [ 909.217359] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 909.222703] ? trace_hardirqs_off_caller+0x6e/0x210 [ 909.227702] ? do_syscall_64+0x21/0x620 [ 909.231658] do_syscall_64+0xf9/0x620 [ 909.235439] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 909.240617] RIP: 0033:0x7f2c510b90c9 [ 909.244311] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 909.263205] RSP: 002b:00007f2c4f62b168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 909.270892] RAX: ffffffffffffffda RBX: 00007f2c511d8f80 RCX: 00007f2c510b90c9 [ 909.278151] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 [ 909.285408] RBP: 00007f2c51114ae9 R08: 0000000000000000 R09: 0000000000000000 [ 909.292665] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 909.299927] R13: 00007ffe3c8cfe3f R14: 00007f2c4f62b300 R15: 0000000000022000 [ 909.307456] Kernel Offset: disabled [ 909.311157] Rebooting in 86400 seconds..