, 0x0, 0x0, 0x10}, 0x0) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:19:30 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:19:31 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:19:31 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:19:33 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(0x0) 10:19:33 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:19:33 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:19:34 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:19:34 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:19:34 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:19:34 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(0x0) 10:19:34 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:19:34 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2539.791017][ C1] net_ratelimit: 23 callbacks suppressed [ 2539.791026][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2539.791148][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2539.796766][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2539.796880][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2539.803210][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2539.808631][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2539.870998][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2539.876855][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2540.191006][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2540.196923][ C1] protocol 88fb is buggy, dev hsr_slave_1 10:19:35 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:19:35 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(0x0) 10:19:36 executing program 5: syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x0, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0x0) 10:19:36 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:19:38 executing program 5: syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x0, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0x0) 10:19:38 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:19:38 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:19:40 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2546.031034][ C0] net_ratelimit: 26 callbacks suppressed [ 2546.031043][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2546.031069][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2546.036801][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2546.042636][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2546.060058][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2546.111032][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2546.117050][ C1] protocol 88fb is buggy, dev hsr_slave_1 10:19:41 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:19:41 executing program 5: syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x0, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0x0) [ 2546.431026][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2546.436962][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2546.511010][ C0] protocol 88fb is buggy, dev hsr_slave_0 10:19:42 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:19:42 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:19:42 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:19:42 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:19:42 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:19:42 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:19:45 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:19:45 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:19:46 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:19:46 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2552.271007][ C0] net_ratelimit: 24 callbacks suppressed [ 2552.271015][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2552.271043][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2552.276785][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2552.282636][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2552.299809][ C1] protocol 88fb is buggy, dev hsr_slave_1 10:19:47 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2552.351030][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2552.356896][ C1] protocol 88fb is buggy, dev hsr_slave_1 10:19:47 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:19:47 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2552.671012][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2552.676867][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2552.751016][ C0] protocol 88fb is buggy, dev hsr_slave_0 10:19:48 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:19:49 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:19:50 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2554.977643][T27714] FS-Cache: Duplicate cookie detected [ 2554.983521][T27714] FS-Cache: O-cookie c=0000000077dd7ba7 [p=0000000028f6d4be fl=222 nc=0 na=1] [ 2554.992616][T27714] FS-Cache: O-cookie d=0000000024b13ec6 n=00000000f4d28048 [ 2554.999994][T27714] FS-Cache: O-key=[10] '02000200000802000000' [ 2555.006440][T27714] FS-Cache: N-cookie c=000000006ffd23b7 [p=0000000028f6d4be fl=2 nc=0 na=1] [ 2555.015249][T27714] FS-Cache: N-cookie d=0000000024b13ec6 n=0000000010c45e2f [ 2555.022595][T27714] FS-Cache: N-key=[10] '02000200000802000000' 10:19:50 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:19:50 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:19:51 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:19:52 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:19:53 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2558.511026][ C1] net_ratelimit: 24 callbacks suppressed [ 2558.511035][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2558.511081][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2558.516744][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2558.534237][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2558.540012][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2558.590999][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2558.596936][ C1] protocol 88fb is buggy, dev hsr_slave_1 10:19:53 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') mknod(0x0, 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2558.911010][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2558.916894][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2558.990996][ C0] protocol 88fb is buggy, dev hsr_slave_0 10:19:54 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:19:54 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:19:54 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, 0x0, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:19:55 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:19:55 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:19:55 executing program 5: syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) 10:19:55 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:19:56 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') mknod(0x0, 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:19:58 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, 0x0, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:19:58 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:19:59 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2564.750997][ C1] net_ratelimit: 25 callbacks suppressed [ 2564.751006][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2564.751042][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2564.757211][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2564.774559][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2564.780331][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2564.830998][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2564.836850][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2565.150994][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2565.156824][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2565.230995][ C0] protocol 88fb is buggy, dev hsr_slave_0 10:20:00 executing program 5: mkdir(&(0x7f00000007c0)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file1\x00', 0x0) rename(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00') 10:20:00 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, 0x0, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:20:00 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:20:01 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') mknod(0x0, 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:20:05 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:20:05 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:20:05 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000840)={0x0, 0xa, 0x1, {0xb, @pix={0x0, 0x1f}}}) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000600)={0x0, 0xb, 0x4, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "18010004"}, 0x0, 0x0, @userptr=0x100000001, 0x4}) keyctl$setperm(0x5, 0x0, 0x0) 10:20:06 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000006c0)=0x1ff, 0x5) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000000c0), 0x2ba) recvmsg(r0, &(0x7f00000005c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000740)=[{&(0x7f0000003ac0)=""/4096, 0xd400}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) syz_execute_func(&(0x7f00000001c0)="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") [ 2570.991047][ C0] net_ratelimit: 25 callbacks suppressed [ 2570.991056][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2570.991083][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2570.996994][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2571.002865][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2571.020603][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2571.071008][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2571.076834][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2571.391027][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2571.396879][ C1] protocol 88fb is buggy, dev hsr_slave_1 10:20:06 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2571.471020][ C0] protocol 88fb is buggy, dev hsr_slave_0 10:20:06 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:20:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x6) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000080)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 10:20:07 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') mknod(&(0x7f0000000080)='./file0\x00', 0x0, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2573.628805][T27867] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 10:20:08 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:20:08 executing program 4: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = timerfd_create(0x9, 0x0) dup2(r0, r1) 10:20:08 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') mknod(&(0x7f0000000080)='./file0\x00', 0x0, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:20:08 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:20:09 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x5423, &(0x7f00000000c0)={0x2}) 10:20:09 executing program 2: bind$inet6(0xffffffffffffffff, &(0x7f00000001c0), 0x1c) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000840)={0x0, 0xa, 0x1, {0xb, @pix={0x0, 0x1f}}}) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, 0x0) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000600)={0x0, 0xb, 0x4, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "18010004"}, 0x0, 0x0, @userptr=0x100000001, 0x4}) add_key$user(0x0, &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) 10:20:10 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:20:11 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:20:11 executing program 5: 10:20:11 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') mknod(&(0x7f0000000080)='./file0\x00', 0x0, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2577.231008][ C1] net_ratelimit: 24 callbacks suppressed [ 2577.231017][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2577.231051][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2577.236765][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2577.254605][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2577.260388][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2577.311059][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2577.317257][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2577.631006][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2577.636951][ C1] protocol 88fb is buggy, dev hsr_slave_1 10:20:12 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2577.710990][ C0] protocol 88fb is buggy, dev hsr_slave_0 10:20:12 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:20:12 executing program 2: 10:20:15 executing program 4: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = timerfd_create(0x9, 0x0) dup2(r0, r1) 10:20:15 executing program 5: 10:20:15 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0x0) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:20:15 executing program 2: 10:20:15 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:20:17 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = timerfd_create(0x9, 0x0) dup2(r0, r1) 10:20:17 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:20:17 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0x0) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:20:17 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2583.471036][ C1] net_ratelimit: 22 callbacks suppressed [ 2583.471046][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2583.471083][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2583.476805][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2583.494171][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2583.499978][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2583.551028][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2583.557150][ C1] protocol 88fb is buggy, dev hsr_slave_1 10:20:18 executing program 2: [ 2583.871036][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2583.876867][ C1] protocol 88fb is buggy, dev hsr_slave_1 10:20:19 executing program 5: 10:20:19 executing program 4: r0 = shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x4000) shmdt(r0) [ 2583.950996][ C0] protocol 88fb is buggy, dev hsr_slave_0 10:20:20 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0x0) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:20:20 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xf, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x6}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 10:20:20 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000080)={0x1, 0x0, [0x100000c0000083, 0x10000000000000]}) [ 2586.747072][T27973] 10:20:21 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:20:22 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(0x0) [ 2587.124929][T27973] ********************************************************** 10:20:22 executing program 4: r0 = shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x4000) shmdt(r0) [ 2587.295338][T27973] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 2588.151153][T27973] ** ** 10:20:23 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:20:23 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(0x0) [ 2588.917399][T27973] ** trace_printk() being used. Allocating extra memory. ** [ 2588.966673][T27973] ** ** [ 2588.979771][T27973] ** This means that this is a DEBUG kernel and it is ** [ 2589.002606][T27973] ** unsafe for production use. ** 10:20:24 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:20:24 executing program 5: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote, @local, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, 0x0) 10:20:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000000140)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$smack_current(r2, &(0x7f0000000100)='security\x00', 0x9) ptrace$setopts(0x4206, r1, 0x0, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 10:20:24 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(0x0) [ 2589.026277][T27973] ** ** 10:20:24 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2589.068264][T27973] ** If you see this message and you are not debugging ** [ 2589.078624][T27973] ** the kernel, report this immediately to your vendor! ** [ 2589.092361][T27973] ** ** [ 2589.099939][T27973] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 2589.108553][T27973] ********************************************************** [ 2589.710994][ C1] net_ratelimit: 22 callbacks suppressed [ 2589.711002][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2589.711037][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2589.716712][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2589.734055][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2589.740088][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2589.790997][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2589.796814][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2590.111166][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2590.117154][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2590.190989][ C0] protocol 88fb is buggy, dev hsr_slave_0 10:20:27 executing program 2: 10:20:27 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x20000000000) 10:20:27 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:20:27 executing program 0: 10:20:29 executing program 2: 10:20:29 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:20:29 executing program 4: 10:20:29 executing program 5: 10:20:29 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:20:29 executing program 2: 10:20:29 executing program 0: chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 2595.951011][ C0] net_ratelimit: 24 callbacks suppressed [ 2595.951019][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2595.951045][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2595.956743][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2595.962556][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2595.979826][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2596.031021][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2596.036979][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2596.351052][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2596.356978][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2596.431031][ C0] protocol 88fb is buggy, dev hsr_slave_0 10:20:32 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r0, 0xc0305710, &(0x7f00000000c0)) 10:20:33 executing program 2: syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x100000001, 0x44000) 10:20:33 executing program 0: unshare(0x400) r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000200)) 10:20:33 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='#wlan0selinuxppp1]\x00') 10:20:35 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:20:35 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:20:35 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:20:35 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:20:35 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:20:37 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2602.190995][ C0] net_ratelimit: 25 callbacks suppressed [ 2602.191002][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2602.191033][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2602.196779][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2602.202573][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2602.219768][ C1] protocol 88fb is buggy, dev hsr_slave_1 10:20:37 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2602.271028][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2602.276892][ C1] protocol 88fb is buggy, dev hsr_slave_1 10:20:37 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2602.591008][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2602.596868][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2602.670999][ C0] protocol 88fb is buggy, dev hsr_slave_0 10:20:39 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:20:39 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:20:40 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:20:40 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:20:40 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:20:40 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:20:40 executing program 5: syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) 10:20:42 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:20:42 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2608.431018][ C1] net_ratelimit: 25 callbacks suppressed [ 2608.431027][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2608.431045][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2608.436784][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2608.442549][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2608.448326][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2608.465516][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2608.510998][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2608.516824][ C1] protocol 88fb is buggy, dev hsr_slave_1 10:20:43 executing program 5: syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) 10:20:43 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2608.831003][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2608.836842][ C1] protocol 88fb is buggy, dev hsr_slave_1 10:20:44 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:20:45 executing program 5: syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) 10:20:45 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:20:47 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:20:47 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x0, 0xda3, 0x80, 0x8}}}}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:20:48 executing program 1: syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:20:48 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:20:49 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2614.670997][ C0] net_ratelimit: 24 callbacks suppressed [ 2614.671005][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2614.671032][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2614.676796][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2614.682563][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2614.699773][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2614.751036][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2614.756975][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2615.070997][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2615.076846][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2615.151007][ C0] protocol 88fb is buggy, dev hsr_slave_0 10:20:50 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:20:51 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:20:51 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x0, 0xda3, 0x80, 0x8}}}}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:20:53 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:20:53 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x0, 0xda3, 0x80, 0x8}}}}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:20:53 executing program 1: syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:20:54 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x0, 0xda3, 0x80}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:20:54 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x0, 0xda3, 0x80, 0x8}}}}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2620.911017][ C0] net_ratelimit: 24 callbacks suppressed [ 2620.911025][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2620.911051][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2620.916748][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2620.922552][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2620.939800][ C1] protocol 88fb is buggy, dev hsr_slave_1 10:20:56 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2620.990993][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2620.996805][ C1] protocol 88fb is buggy, dev hsr_slave_1 10:20:56 executing program 1: syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:20:56 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x0, 0xda3, 0x80}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2621.311019][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2621.316862][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2621.401049][ C0] protocol 88fb is buggy, dev hsr_slave_0 10:20:57 executing program 0: syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) 10:20:57 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x0, 0xda3, 0x80, 0x8}}}}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:20:58 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:20:59 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x0, 0x0, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:20:59 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x0, 0xda3, 0x80}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:21:00 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x0, 0x0, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:21:00 executing program 0: syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) 10:21:01 executing program 5: ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2627.150986][ C0] net_ratelimit: 23 callbacks suppressed [ 2627.150994][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2627.151022][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2627.157066][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2627.162869][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2627.180063][ C1] protocol 88fb is buggy, dev hsr_slave_1 10:21:02 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x0, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2627.230997][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2627.236819][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2627.551004][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2627.556836][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2627.630993][ C0] protocol 88fb is buggy, dev hsr_slave_0 10:21:02 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x0, 0x0, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:21:03 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:21:03 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:21:04 executing program 5: ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2633.391038][ C1] net_ratelimit: 24 callbacks suppressed [ 2633.391047][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2633.391066][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2633.396948][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2633.402696][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2633.408488][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2633.425659][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2633.470997][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2633.476808][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2633.791031][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2633.798139][ C1] protocol 88fb is buggy, dev hsr_slave_1 10:21:09 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x0, 0xda3, 0x80, 0x8}}}}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:21:09 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:21:09 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:21:09 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:21:09 executing program 5: ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:21:09 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x0, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:21:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x40, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000280)) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000200)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') sendfile(r1, r2, 0x0, 0x1) r3 = getpgrp(0xffffffffffffffff) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) syz_open_procfs(r3, &(0x7f0000000040)='net/udp\x00') 10:21:12 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:21:12 executing program 4: r0 = userfaultfd(0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r2 = memfd_create(&(0x7f0000000100)='t\b\x00\x00\xf9\xff\x85nG\x13g\xa6\x05', 0x0) flock(0xffffffffffffffff, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r2, r1, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x449c73fe, 0x0) 10:21:12 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x0, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:21:14 executing program 5: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) unshare(0x20400) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f00000002c0)=r0) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000300)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000340)=0x1c) setsockopt$inet6_tcp_buf(r1, 0x6, 0x1f, &(0x7f0000000380)="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", 0xc00) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=ANY=[@ANYBLOB="5b643a3a5d77af366fbf3e41fe832c303a"], 0x0, &(0x7f0000000140)='ceph\x00', 0x0, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000f80)='/dev/dsp#\x00', 0x400, 0x0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000fc0)={0x30, 0x5, 0x0, {0x0, 0x0, 0x1, 0x4}}, 0x30) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x90, 0x0) 10:21:14 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2639.631002][ C0] net_ratelimit: 25 callbacks suppressed [ 2639.631011][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2639.631038][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2639.636839][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2639.642691][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2639.661374][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2639.711041][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2639.716863][ C1] protocol 88fb is buggy, dev hsr_slave_1 10:21:14 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2640.031010][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2640.036855][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2640.110995][ C0] protocol 88fb is buggy, dev hsr_slave_0 10:21:15 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:21:17 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000080)={0x50, 0x0, 0x1, {0x7, 0x1d, 0x0, 0x0, 0x7}}, 0x50) 10:21:17 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:21:17 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000014000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_NESTED_STATE(r2, 0x4080aebf, &(0x7f0000000440)={0x0, 0x0, 0x2080, {0x80ffff00000000}, [], "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", "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"}) 10:21:17 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) unshare(0x20400) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f00000002c0)=r0) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000300)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000340)=0x1c) setsockopt$inet6_tcp_buf(r1, 0x6, 0x1f, &(0x7f0000000380)="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", 0xc00) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=ANY=[@ANYBLOB="5b643a3a5d77af366fbf3e41fe832c303a3a303a001158a3a3562009a1f7c3c6c4a40ceda2df09a80eda7ebbc4a9ebbbc4e908"], 0x0, &(0x7f0000000140)='ceph\x00', 0x0, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000f80)='/dev/dsp#\x00', 0x400, 0x0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000fc0)={0x30, 0x5, 0x0, {0x0, 0x0, 0x1, 0x4}}, 0x30) r3 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x90, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=@getneigh={0x14, 0x1e, 0x400, 0x70bd28, 0x25dfdbfb, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x20040800}, 0x4) getsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000280), 0x0) 10:21:20 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x0, 0x0) poll(&(0x7f0000000280)=[{r0}], 0x1, 0x9) 10:21:20 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @loopback}, 0x10) recvmsg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="984a2ae92cb8b64c0f05bf05000000c4a37bf0c5c041e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fdee51bc421045f4607f2f0fe4900c426f2f045f61964620f38fd52262e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20f7cd8efa1a12ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53d2c40f0f9f3c6436b2aa66450fc4650000c4e39978c104c441c05983f9070bb3ddcdcda2660f3834680084635e4c3fcaa3c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3f30f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") 10:21:21 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, 0x0, &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2645.871024][ C1] net_ratelimit: 23 callbacks suppressed [ 2645.871033][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2645.871939][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2645.876765][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2645.883150][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2645.888353][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2645.905612][ C1] protocol 88fb is buggy, dev hsr_slave_1 10:21:21 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2645.951050][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2645.956894][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2646.271041][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2646.276862][ C1] protocol 88fb is buggy, dev hsr_slave_1 10:21:24 executing program 5: mkdir(&(0x7f00000007c0)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file1\x00', 0x0) rename(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00') futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:21:24 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) unshare(0x20400) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f00000002c0)=r0) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000300)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000340)=0x1c) setsockopt$inet6_tcp_buf(r1, 0x6, 0x1f, &(0x7f0000000380)="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", 0xc00) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=ANY=[@ANYBLOB="5b643a3a5d77af366fbf3e41fe832c303a3a303a001158a3a3562009a1f7c3c6c4a40ceda2df09a80eda7ebbc4a9ebbbc4e908"], 0x0, &(0x7f0000000140)='ceph\x00', 0x0, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000f80)='/dev/dsp#\x00', 0x400, 0x0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000fc0)={0x30, 0x5, 0x0, {0x0, 0x0, 0x1, 0x4}}, 0x30) r3 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x90, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=@getneigh={0x14, 0x1e, 0x400, 0x70bd28, 0x25dfdbfb, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x20040800}, 0x4) getsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000280), 0x0) 10:21:24 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:21:24 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, 0x0, &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:21:24 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @loopback}, 0x10) recvmsg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="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") 10:21:24 executing program 0: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) [ 2652.110994][ C0] net_ratelimit: 24 callbacks suppressed [ 2652.111002][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2652.111029][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2652.116784][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2652.122551][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2652.139718][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2652.191012][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2652.196843][ C1] protocol 88fb is buggy, dev hsr_slave_1 10:21:27 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x5414, &(0x7f00000000c0)) [ 2652.510997][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2652.516910][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2652.590986][ C0] protocol 88fb is buggy, dev hsr_slave_0 10:21:27 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) setxattr(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0xffffff7ffffffffc, @dev={0xac, 0xb, 0xc}}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}}) rename(0x0, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000280)={'vcan0\x00', {0x2, 0x0, @multicast1}}) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) write$UHID_CREATE(r0, 0x0, 0x0) creat(0x0, 0x0) 10:21:27 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, 0x0, &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:21:27 executing program 2: r0 = socket(0x800000000000011, 0x800000002, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x145000, 0x0) r1 = socket$inet(0x2, 0x4008000000000004, 0x6) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) r2 = gettid() ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000040)=r2) socket$inet(0x10, 0x2000000000000003, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) 10:21:29 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:21:29 executing program 0: 10:21:30 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:21:31 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) unshare(0x20400) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f00000002c0)=r0) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000300)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000340)=0x1c) setsockopt$inet6_tcp_buf(r1, 0x6, 0x1f, &(0x7f0000000380)="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", 0xc00) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=ANY=[@ANYBLOB="5b643a3a5d77af366fbf3e41fe832c303a3a303a001158a3a3562009a1f7c3c6c4a40ceda2df09a80eda7ebbc4a9ebbbc4e908"], 0x0, &(0x7f0000000140)='ceph\x00', 0x0, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000f80)='/dev/dsp#\x00', 0x400, 0x0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000fc0)={0x30, 0x5, 0x0, {0x0, 0x0, 0x1, 0x4}}, 0x30) r3 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x90, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=@getneigh={0x14, 0x1e, 0x400, 0x70bd28, 0x25dfdbfb, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x20040800}, 0x4) getsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000280), 0x0) 10:21:31 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:21:31 executing program 0: 10:21:32 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2658.351025][ C0] net_ratelimit: 23 callbacks suppressed [ 2658.351034][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2658.351063][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2658.356768][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2658.362568][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2658.379753][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2658.431013][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2658.436940][ C1] protocol 88fb is buggy, dev hsr_slave_1 10:21:33 executing program 5: 10:21:33 executing program 0: 10:21:33 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2658.751013][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2658.757303][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2658.830990][ C0] protocol 88fb is buggy, dev hsr_slave_0 10:21:35 executing program 5: [ 2664.590989][ C0] net_ratelimit: 23 callbacks suppressed [ 2664.590998][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2664.591025][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2664.596726][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2664.602553][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2664.619726][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2664.671018][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2664.676846][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2664.990992][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2664.996814][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2665.071006][ C0] protocol 88fb is buggy, dev hsr_slave_0 10:21:40 executing program 2: 10:21:40 executing program 4: 10:21:40 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:21:40 executing program 0: 10:21:40 executing program 5: 10:21:40 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:21:41 executing program 4: 10:21:41 executing program 5: 10:21:41 executing program 2: 10:21:41 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, 0x0) unlinkat(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x80, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="00006dcac843"], 0x6) perf_event_open(&(0x7f0000000800)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) gettid() mkdir(&(0x7f0000001540)='./file0\x00', 0x0) 10:21:42 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:21:43 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f00000001c0)) fcntl$getown(r0, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r2 = getpgid(0xffffffffffffffff) r3 = syz_open_procfs(r2, &(0x7f0000000000)='clear_refs\x00') r4 = syz_open_procfs(0x0, &(0x7f0000000200)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') sendfile(r3, r4, 0x0, 0x1) ioctl$VHOST_VSOCK_SET_RUNNING(r3, 0x4004af61, &(0x7f00000000c0)=0x1) r5 = getpgrp(0xffffffffffffffff) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) syz_open_procfs(r5, 0x0) 10:21:44 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(r0, &(0x7f0000000000)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) llistxattr(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 10:21:44 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, 0x0) unlinkat(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x80, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="00006dcac843"], 0x6) perf_event_open(&(0x7f0000000800)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) gettid() mkdir(&(0x7f0000001540)='./file0\x00', 0x0) 10:21:44 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:21:44 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, 0x0) unlinkat(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x80, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="00006dcac843"], 0x6) perf_event_open(&(0x7f0000000800)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) gettid() mkdir(&(0x7f0000001540)='./file0\x00', 0x0) 10:21:44 executing program 5: exit(0x0) syz_execute_func(&(0x7f0000000380)="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") 10:21:45 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2670.831019][ C0] net_ratelimit: 24 callbacks suppressed [ 2670.831027][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2670.831051][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2670.836751][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2670.842549][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2670.859724][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2670.911033][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2670.916871][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2671.231008][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2671.236811][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2671.311001][ C0] protocol 88fb is buggy, dev hsr_slave_0 10:21:46 executing program 2: pause() syz_execute_func(&(0x7f0000000000)="3666440f50f564ff0941c3c4e1a5f97300660f3a8e16649c675100617b12e5c441dfd04b00c442019dccd211b0d46f") syz_execute_func(&(0x7f00000002c0)="c4e3f9614832074a2be93699980f053ef3aec4a37bf0c50341e2e926b5c9f956660f5b9591d300008d3581810000262fd9f9c4c2b9b6b90000000000d2dec46164440f2936c421795184fb22910000c422458e245dd50f00000000a39088008047f08fe97c810f69e08f4cbec5c4c2858c3f2d56c4a259b89a1c0000002505000000fd1d9090c7abc4c3fd0171021b213ea51313000043d9497d410fa9a642857e00c441555474f6fec30f3a603d06f0ffff009358e16d71d4d2d5838305ba16f2aed9fdf045832d950000002cf5eba225adeab413c4c37d096208c2c481fa706b00f9ef0008c481b1f39f0d000000c401511644bf4100b150400f381da900e001f0428155fdd2cb0000c6d59134ff66dee440dcfb3646d39bce00000091047b208f495801979595ffff7f7f804aa021430f9d2edf3b7d0f12e400f4260fe88c4200000000c402813d7f0ee190c4b0c110c2a5f7ffff7f99993b0004f3337b6b440f9c650066450f3823de0af3430fc4c17829c8c463ad0b5890ca6c0f84500000006466420f3a0b0100d80042d9cec4a1fc2e5b156a85859e6d6d8175759d1b660f3830c8c462252b6e0b47f6d0f0f0839200000080a79cffffc326f0ff0ff97c6d8300afb1b1cb8f09c096f344e42ec4a17c10020f154122c4e171f56d00c402bd8e98bef687e8246681380015c4026726670f010e0f7e54880d07c40155f64e06ec410fd2f8c4a17b2c2249fcfc8205e26236f3440f7f1797972ec1048e5c0b5c0b5c670f0d5b0064450fe242d9c481635a9c70d3813811ee10c0c462f9416e1b4e40c9dbe19d1b1b0fadd5818a2b233333fdffff7fc4217ee60461880c0000008fc97881b500000000") 10:21:46 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:21:47 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:21:47 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:21:48 executing program 2: syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) 10:21:49 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:21:49 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:21:50 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:21:50 executing program 2: syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) 10:21:50 executing program 0: syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:21:50 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2677.071003][ C0] net_ratelimit: 23 callbacks suppressed [ 2677.071011][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2677.071038][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2677.077164][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2677.083417][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2677.103986][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2677.151022][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2677.158684][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2677.470990][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2677.476810][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2677.550989][ C0] protocol 88fb is buggy, dev hsr_slave_0 10:21:53 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:21:53 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:21:54 executing program 2: syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) 10:21:54 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:21:54 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:21:54 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:21:54 executing program 0: syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:21:56 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:21:56 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:21:57 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2683.311013][ C0] net_ratelimit: 22 callbacks suppressed [ 2683.311021][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2683.311049][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2683.316775][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2683.322570][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2683.339725][ C1] protocol 88fb is buggy, dev hsr_slave_1 10:21:58 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2683.391015][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2683.396833][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2683.711008][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2683.716834][ C1] protocol 88fb is buggy, dev hsr_slave_1 10:21:58 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2683.791011][ C0] protocol 88fb is buggy, dev hsr_slave_0 10:22:02 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(0x0) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:22:02 executing program 0: syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:22:02 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:22:02 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:22:02 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:22:03 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2688.395634][T28707] FS-Cache: Duplicate cookie detected [ 2688.401265][T28707] FS-Cache: O-cookie c=00000000134125c1 [p=0000000028f6d4be fl=222 nc=0 na=1] [ 2688.410218][T28707] FS-Cache: O-cookie d=0000000024b13ec6 n=00000000d73dbf06 [ 2688.417654][T28707] FS-Cache: O-key=[10] '02000200000802000000' [ 2688.424151][T28707] FS-Cache: N-cookie c=0000000047e08e0a [p=0000000028f6d4be fl=2 nc=0 na=1] [ 2688.433888][T28707] FS-Cache: N-cookie d=0000000024b13ec6 n=00000000de55f007 [ 2688.441373][T28707] FS-Cache: N-key=[10] '02000200000802000000' [ 2688.508238][T28712] FS-Cache: Duplicate cookie detected [ 2688.514167][T28712] FS-Cache: O-cookie c=00000000134125c1 [p=0000000028f6d4be fl=222 nc=0 na=1] [ 2688.523277][T28712] FS-Cache: O-cookie d=0000000024b13ec6 n=00000000d73dbf06 [ 2688.530650][T28712] FS-Cache: O-key=[10] '02000200000802000000' [ 2688.537690][T28712] FS-Cache: N-cookie c=00000000b90ca59c [p=0000000028f6d4be fl=2 nc=0 na=1] [ 2688.546632][T28712] FS-Cache: N-cookie d=0000000024b13ec6 n=00000000484d330f [ 2688.554306][T28712] FS-Cache: N-key=[10] '02000200000802000000' [ 2689.550986][ C0] net_ratelimit: 22 callbacks suppressed [ 2689.550994][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2689.551027][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2689.556730][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2689.562532][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2689.579843][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2689.631033][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2689.636872][ C1] protocol 88fb is buggy, dev hsr_slave_1 10:22:04 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, 0x0, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:22:04 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:22:04 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:22:04 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(0x0) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:22:04 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2689.951001][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2689.956825][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2690.031001][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2691.421712][T28737] FS-Cache: Duplicate cookie detected [ 2691.427147][T28737] FS-Cache: O-cookie c=0000000068e13a45 [p=0000000028f6d4be fl=222 nc=0 na=1] [ 2691.436248][T28737] FS-Cache: O-cookie d=0000000024b13ec6 n=000000007adb1761 [ 2691.443530][T28737] FS-Cache: O-key=[10] '02000200000802000000' [ 2691.449660][T28737] FS-Cache: N-cookie c=00000000ae928b52 [p=0000000028f6d4be fl=2 nc=0 na=1] [ 2691.458386][T28737] FS-Cache: N-cookie d=0000000024b13ec6 n=0000000095d7dbef [ 2691.465653][T28737] FS-Cache: N-key=[10] '02000200000802000000' [ 2691.716631][T28744] FS-Cache: Duplicate cookie detected [ 2691.722268][T28744] FS-Cache: O-cookie c=0000000068e13a45 [p=0000000028f6d4be fl=222 nc=0 na=1] [ 2691.731427][T28744] FS-Cache: O-cookie d=0000000024b13ec6 n=000000007adb1761 [ 2691.738903][T28744] FS-Cache: O-key=[10] '02000200000802000000' [ 2691.745560][T28744] FS-Cache: N-cookie c=000000009b64bd06 [p=0000000028f6d4be fl=2 nc=0 na=1] [ 2691.754998][T28744] FS-Cache: N-cookie d=0000000024b13ec6 n=000000001eefdee5 [ 2691.762285][T28744] FS-Cache: N-key=[10] '02000200000802000000' 10:22:07 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, 0x0, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:22:07 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:22:07 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(0x0) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:22:09 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, 0x0, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:22:09 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:22:09 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:22:10 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:22:10 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(0x0) 10:22:10 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:22:10 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:22:10 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, 0x0, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:22:10 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2695.791010][ C1] net_ratelimit: 24 callbacks suppressed [ 2695.791019][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2695.791024][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2695.791085][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2695.796829][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2695.819877][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2695.825719][ C1] protocol 88fb is buggy, dev hsr_slave_1 10:22:10 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2695.870996][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2695.876822][ C1] protocol 88fb is buggy, dev hsr_slave_1 10:22:11 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:22:11 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(0x0) 10:22:11 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2696.190998][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2696.196821][ C1] protocol 88fb is buggy, dev hsr_slave_1 10:22:13 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:22:15 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:22:15 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:22:16 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2702.030988][ C0] net_ratelimit: 23 callbacks suppressed [ 2702.030997][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2702.031030][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2702.036728][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2702.042618][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2702.059860][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2702.111023][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2702.116963][ C1] protocol 88fb is buggy, dev hsr_slave_1 10:22:17 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2702.430996][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2702.436816][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2702.510982][ C0] protocol 88fb is buggy, dev hsr_slave_0 10:22:19 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:22:20 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(0x0) 10:22:20 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:22:20 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:22:20 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, 0x0, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:22:20 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, 0x0, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2706.237189][T28853] FS-Cache: Duplicate cookie detected [ 2706.242872][T28853] FS-Cache: O-cookie c=00000000b90ca59c [p=0000000028f6d4be fl=222 nc=0 na=1] [ 2706.251937][T28853] FS-Cache: O-cookie d=0000000024b13ec6 n=000000006b699314 [ 2706.259309][T28853] FS-Cache: O-key=[10] '02000200000802000000' [ 2706.265787][T28853] FS-Cache: N-cookie c=000000009fbf1304 [p=0000000028f6d4be fl=2 nc=0 na=1] [ 2706.274904][T28853] FS-Cache: N-cookie d=0000000024b13ec6 n=0000000047f0d7d5 [ 2706.282253][T28853] FS-Cache: N-key=[10] '02000200000802000000' 10:22:21 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) 10:22:22 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:22:22 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:22:22 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, 0x0, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:22:22 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2708.143609][T28887] FS-Cache: Duplicate cookie detected [ 2708.149291][T28887] FS-Cache: O-cookie c=0000000068e13a45 [p=0000000028f6d4be fl=222 nc=0 na=1] [ 2708.158316][T28887] FS-Cache: O-cookie d=0000000024b13ec6 n=0000000081156bbf [ 2708.166076][T28887] FS-Cache: O-key=[10] '02000200000802000000' [ 2708.172429][T28887] FS-Cache: N-cookie c=00000000226f586d [p=0000000028f6d4be fl=2 nc=0 na=1] [ 2708.181403][T28887] FS-Cache: N-cookie d=0000000024b13ec6 n=00000000a9c806a0 [ 2708.188739][T28887] FS-Cache: N-key=[10] '02000200000802000000' [ 2708.271004][ C0] net_ratelimit: 22 callbacks suppressed [ 2708.271013][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2708.271046][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2708.276739][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2708.282564][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2708.299845][ C1] protocol 88fb is buggy, dev hsr_slave_1 10:22:23 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2708.351024][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2708.356847][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2708.671027][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2708.676854][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2708.751057][ C0] protocol 88fb is buggy, dev hsr_slave_0 10:22:24 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:22:24 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, 0x0, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:22:26 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:22:26 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:22:27 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:22:27 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:22:29 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, 0x0, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2714.510979][ C1] net_ratelimit: 25 callbacks suppressed [ 2714.510987][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2714.511023][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2714.516733][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2714.534276][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2714.540100][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2714.590986][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2714.596821][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2714.910985][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2714.916807][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2714.990988][ C0] protocol 88fb is buggy, dev hsr_slave_0 10:22:30 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:22:30 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:22:31 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:22:31 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:22:31 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:22:33 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) [ 2718.095202][T28963] FS-Cache: Duplicate cookie detected [ 2718.100688][T28963] FS-Cache: O-cookie c=000000009fbf1304 [p=0000000028f6d4be fl=222 nc=0 na=1] [ 2718.109655][T28963] FS-Cache: O-cookie d=0000000024b13ec6 n=00000000484d330f [ 2718.116961][T28963] FS-Cache: O-key=[10] '02000200000802000000' [ 2718.123172][T28963] FS-Cache: N-cookie c=00000000226f586d [p=0000000028f6d4be fl=2 nc=0 na=1] [ 2718.131948][T28963] FS-Cache: N-cookie d=0000000024b13ec6 n=0000000009a4267e [ 2718.139159][T28963] FS-Cache: N-key=[10] '02000200000802000000' 10:22:33 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:22:33 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:22:33 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:22:34 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:22:35 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:22:35 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2720.751018][ C0] net_ratelimit: 23 callbacks suppressed [ 2720.751027][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2720.751060][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2720.757160][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2720.763265][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2720.780429][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2720.830986][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2720.836813][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2721.151113][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2721.156966][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2721.230992][ C0] protocol 88fb is buggy, dev hsr_slave_0 10:22:39 executing program 3: socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x0, &(0x7f0000000180)=""/118, 0xffffffffffffff25) r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000080)=0x8, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) unshare(0x40000000) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000040)={'lapb0\x00', {0x2, 0x4e20, @multicast1}}) 10:22:39 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:22:39 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:22:39 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:22:39 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:22:39 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2725.601156][ C0] sched: DL replenish lagged too much [ 2725.673149][T29020] IPVS: ftp: loaded support on port[0] = 21 [ 2726.387628][T29020] IPVS: ftp: loaded support on port[0] = 21 10:22:41 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8') r2 = syz_open_procfs(0x0, &(0x7f0000000200)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') sendfile(r1, r2, 0x0, 0x1) [ 2726.990984][ C1] net_ratelimit: 22 callbacks suppressed [ 2726.990993][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2726.991034][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2726.996727][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2727.014049][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2727.019828][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2727.070991][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2727.076814][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2727.391014][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2727.396830][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2727.470990][ C0] protocol 88fb is buggy, dev hsr_slave_0 10:22:43 executing program 3: userfaultfd(0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_proto_private(0xffffffffffffffff, 0x89e9, &(0x7f0000000240)="7b0b6c56e5fb484660c8dd8ab417c277be38983456fd152688307751328c780511f0b747ea6d2e3d4f037bdadffb4e49af203000b7a582293280a0a3afb3050611b99e521c55ddabc9acbda3128332ff78aa3b70b9ca97398aca8b9333002ca938d99c5fe8d0d80523bbedb93bb54e77ac22994f549ebae8fc8738430c184dcde5ac") sendmmsg(0xffffffffffffffff, &(0x7f0000001d40)=[{{&(0x7f0000001a00)=@llc={0x1a, 0x6, 0x20, 0x8, 0x7f8d, 0x5}, 0x80, &(0x7f0000001d00)=[{&(0x7f0000001c40)="3c9e8335cb68439eba4d2fa39e9f75708f47829bdf8074ecd56715c11dbbe32ec9997f287e42770fa6717b7f3315c96331b642672b5a4b24e8aeaacf3876aa5f5133fe7b796d693e070bc57535a173856d01f30e8c0a9d304b73c470ed26e6f618f15e9234f8f76394c9701dfd02e527d00dce258e70f3373c88496b2f775fc96ec433fb702c6eb7efc31b00279e6c54bbe7550947d60306ebef489f17baf4a8bad079e9b5da4bb7333fd634a3052785", 0xb0}], 0x1}, 0x7fffffff}], 0x1, 0x20004010) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\b\x00\x00\xf9\xff\x85nG\x13g\xa6\x05', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r1, r0, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:22:43 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:22:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x2d0, 0x400000000000000, &(0x7f00008feff0)={&(0x7f0000000280)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x70}}, 0x0) 10:22:43 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) lsetxattr$security_evm(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000040), &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 10:22:44 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:22:46 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:22:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:22:46 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\b\x00\x00\xf9\xff\x85nG\x13g\xa6\x05', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r1, r0, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f00000000c0)) 10:22:47 executing program 4: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='syz_tun\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) 10:22:47 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2733.231006][ C1] net_ratelimit: 22 callbacks suppressed [ 2733.231021][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2733.231056][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2733.236761][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2733.254061][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2733.259828][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2733.311077][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2733.316894][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2733.631022][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2733.636848][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2733.710998][ C0] protocol 88fb is buggy, dev hsr_slave_0 10:22:50 executing program 3: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) 10:22:50 executing program 2: ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001d40), 0x0, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\b\x00\x00\xf9\xff\x85nG\x13g\xa6\x05', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r1, r0, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:22:52 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:22:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000480)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x129f0817) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x0, 0x0}, 0x10) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, 0x0, &(0x7f00000000c0)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 10:22:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec7) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:22:52 executing program 5: syz_open_dev$vbi(&(0x7f0000000280)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, 0x0) ioctl$SIOCGETLINKNAME(0xffffffffffffffff, 0x89e0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, &(0x7f0000000600), 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000540)=[{0x0}], 0x1, 0x0) 10:22:54 executing program 2: userfaultfd(0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_proto_private(0xffffffffffffffff, 0x89e9, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001d40)=[{{&(0x7f0000001a00)=@llc={0x1a, 0x6, 0x20, 0x8, 0x7f8d, 0x5}, 0x80, &(0x7f0000001d00)}}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\b\x00\x00\xf9\xff\x85nG\x13g\xa6\x05', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r1, r0, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:22:54 executing program 3: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x50000}}) 10:22:54 executing program 5: r0 = userfaultfd(0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r2 = memfd_create(&(0x7f0000000100)='t\b\x00\x00\xf9\xff\x85nG\x13g\xa6\x05', 0x0) flock(0xffffffffffffffff, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r2, r1, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) [ 2739.470987][ C1] net_ratelimit: 24 callbacks suppressed [ 2739.470995][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2739.471031][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2739.476724][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2739.494108][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2739.499887][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2739.550991][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2739.556826][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2739.870986][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2739.876821][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2739.951012][ C0] protocol 88fb is buggy, dev hsr_slave_0 10:22:55 executing program 2: syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) dup(0xffffffffffffffff) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="f834409f"], 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec7) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:22:55 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000014000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_NESTED_STATE(r2, 0x4080aebf, &(0x7f0000000440)={0x0, 0x0, 0x2080, {0xffffffffffffffff}, [], "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", "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"}) 10:22:56 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:22:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x9, 0x101, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xffffffffffffffff}, 0x3c) 10:22:57 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2d0, 0x400000000000000, &(0x7f00008feff0)={&(0x7f0000000280)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0xffffff80, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 10:22:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x4501, 0x0) write$P9_RRENAMEAT(r1, 0x0, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') lsetxattr$trusted_overlay_nlink(0x0, &(0x7f0000000a40)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) syz_mount_image$nfs(&(0x7f0000000180)='nfs\x00', 0x0, 0x0, 0x0, 0x0, 0x14800, 0x0) 10:23:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_mount_image$jfs(&(0x7f0000000700)='jfs\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 2745.711010][ C0] net_ratelimit: 22 callbacks suppressed [ 2745.711018][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2745.711052][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2745.716752][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2745.722595][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2745.739780][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2745.790991][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2745.796810][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2746.110992][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2746.116822][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2746.190987][ C0] protocol 88fb is buggy, dev hsr_slave_0 10:23:03 executing program 0: userfaultfd(0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_proto_private(0xffffffffffffffff, 0x89e9, &(0x7f0000000240)="7b0b6c56e5fb484660c8dd8ab417c277be38983456fd152688307751328c780511f0b747ea6d2e3d4f037bdadffb4e49af203000b7a582293280a0a3afb3050611b99e521c55ddabc9acbda3128332ff78aa3b70b9ca97398aca8b9333002ca938d99c5fe8d0d80523bbedb93bb54e77ac22994f549ebae8fc8738430c184dcde5ac") sendmmsg(0xffffffffffffffff, &(0x7f0000001d40)=[{{&(0x7f0000001a00)=@llc={0x1a, 0x6, 0x20, 0x8, 0x7f8d, 0x5}, 0x80, &(0x7f0000001d00)=[{&(0x7f0000001c40)="3c9e8335cb68439eba4d2fa39e9f75708f47829bdf8074ecd56715c11dbbe32ec9997f287e42770fa6717b7f3315c96331b642672b5a4b24e8aeaacf3876aa5f5133fe7b796d693e070bc57535a173856d01f30e8c0a9d304b73c470ed26e6f618f15e9234f8f76394c9701dfd02e527d00dce258e70f3373c88496b2f775fc96ec433fb702c6eb7efc31b00279e6c54bbe7550947d60306ebef489f17baf4a8bad079e9b5da4bb7333fd634a3052785", 0xb0}], 0x1}, 0x7fffffff}], 0x1, 0x20004010) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\b\x00\x00\xf9\xff\x85nG\x13g\xa6\x05', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r1, r0, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:23:03 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:23:03 executing program 5: syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x40000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x4]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 10:23:03 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x80, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="00006dcac8431f3be48a2b6e05a7f015673834df22"], 0x15) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) 10:23:04 executing program 4: 10:23:05 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:23:05 executing program 5: [ 2751.950990][ C1] net_ratelimit: 22 callbacks suppressed [ 2751.951000][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2751.961002][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2751.962901][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2751.968903][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2751.974823][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2751.986553][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2752.031105][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2752.037039][ C1] protocol 88fb is buggy, dev hsr_slave_1 10:23:07 executing program 4: 10:23:07 executing program 0: [ 2752.351043][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2752.357116][ C1] protocol 88fb is buggy, dev hsr_slave_1 10:23:08 executing program 2: 10:23:11 executing program 3: syz_execute_func(&(0x7f00000006c0)="410f01f964ff0941c3c4e2c99758423e46d8731266420fe2e33e0f1110c442019dcc6f") clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000940)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000140)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r0, r1) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) poll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0) 10:23:11 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:23:11 executing program 5: 10:23:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000140), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0xd4789) connect$netlink(r1, &(0x7f0000000000)=@unspec, 0xc) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, 0x1c) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, 0x0, 0x0) 10:23:11 executing program 2: clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) exit(0x0) 10:23:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) clone(0x3106001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x1, 0x2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) setsockopt$inet6_buf(r0, 0x29, 0x0, 0x0, 0x0) 10:23:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r1, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x2000021c) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_mreq(r3, 0x0, 0x23, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r3, 0x0, 0x2a, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 10:23:12 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0xa00) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000180)={0x5, 0x200000022e}) readv(r0, &(0x7f0000000240)=[{&(0x7f0000001480)=""/25, 0x19}], 0x1) [ 2758.191018][ C1] net_ratelimit: 26 callbacks suppressed [ 2758.191027][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2758.191064][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2758.196964][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2758.215208][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2758.221180][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2758.270988][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2758.276999][ C1] protocol 88fb is buggy, dev hsr_slave_1 10:23:13 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2758.591001][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2758.597170][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2758.671030][ C0] protocol 88fb is buggy, dev hsr_slave_0 10:23:14 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x800000008, 0x7fff, 0x8000000001}, 0x2c) r1 = dup2(r0, r0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000006e80)={r1, &(0x7f0000005d80), 0x0, 0x1}, 0x20) 10:23:16 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:23:17 executing program 2: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40046602, &(0x7f0000000000)) io_setup(0x8, &(0x7f0000000200)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000, 0x3000000}]) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x3000000) 10:23:17 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000100)=0x4, 0x4) sendto(r0, &(0x7f0000000180)="ce8e6e41dd5b63902ea431141169de4cfa2970af605d418cfe91a5aacaa67d8b9f77a3d2bed2f6af6218c14fdf5e5216452941fc082a4200", 0x38, 0x0, 0x0, 0x0) 10:23:17 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:23:18 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='projid_map\x00') read(r0, &(0x7f00000003c0)=""/252, 0xfc) [ 2764.431015][ C1] net_ratelimit: 23 callbacks suppressed [ 2764.431024][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2764.431060][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2764.436761][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2764.454094][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2764.459878][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2764.510983][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2764.516811][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2764.830976][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2764.836800][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2764.911014][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2770.671010][ C0] net_ratelimit: 23 callbacks suppressed [ 2770.671018][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2770.671051][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2770.676741][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2770.682578][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2770.699715][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2770.750987][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2770.756886][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2771.071033][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2771.076869][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2771.151014][ C0] protocol 88fb is buggy, dev hsr_slave_0 10:23:27 executing program 0: pause() syz_open_procfs(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000140)='NET_DM\x00') syz_execute_func(&(0x7f0000000000)="3666440f50f564ff0941c3c4e1a5f97300660f3a8e16649c675100617b12e5c441dfd04b00c442019dccd211b0d46f") syz_execute_func(&(0x7f0000003480)="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") 10:23:27 executing program 3: r0 = userfaultfd(0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r2 = memfd_create(&(0x7f0000000100)='t\b\x00\x00\xf9\xff\x85nG\x13g\xa6\x05', 0x0) flock(0xffffffffffffffff, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r2, r1, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(r1, 0x4c01) r3 = dup2(0xffffffffffffffff, r0) ioctl$DRM_IOCTL_MODE_GETCRTC(r3, 0xc06864a1, &(0x7f0000000140)={&(0x7f0000000100)=[0x0, 0x7, 0x4], 0x3, 0x906d, 0x80000001, 0x56, 0x0, 0x3, {0x5, 0x0, 0x2, 0x5, 0xbaba, 0x5, 0x0, 0x20, 0x4, 0x7ff, 0x9, 0xff, 0xfffffffffffffffd, 0x7, "e7e33a992e7b4ab5cd07021b7b4442e0867ddf231278ed2ed7f06e4660f2b755"}}) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x449c73fe, 0x0) [ 2776.910980][ C0] net_ratelimit: 23 callbacks suppressed [ 2776.910988][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2776.911017][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2776.916718][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2776.922516][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2776.939662][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2776.990993][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2776.996827][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2777.310985][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2777.316822][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2777.391050][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2783.151017][ C1] net_ratelimit: 25 callbacks suppressed [ 2783.151026][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2783.151062][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2783.156745][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2783.174062][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2783.179831][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2783.230981][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2783.236836][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2783.551021][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2783.556862][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2783.631022][ C0] protocol 88fb is buggy, dev hsr_slave_0 10:23:38 executing program 4: syz_execute_func(&(0x7f0000000800)="c4e379614832074a2be91cb9980f05f7a6aae28920aec4a37bf0c50141e2e922ebc4a2c42281a7a56ea74dae1ceb262fc4c6cd97e664d11bc421fa6f3d136c000000f2d2dec461dc57b1e67d0b25c4837916d2befa0040dbe1491e2f160f41fe4cbec5c54d0f2c718f56676beeee8f2870b63b309df8f86dc483057f6e3e5340b267f34cb4ba6681f9935499fa6c1fed6c1feda8271ec4647168c4c19dfb96f88e00000f3a16288836e70f8babf27f0000536bd10499660f383ca3300a0000efef768b8b8b27c4a27921f940abd8a1a12ad764cc42dfdb4066bd0ffe383baa32d467460f3300028f6a78106f65030000004074d266413a010f0f30ca30cac442fd21b19b0b0000f267a1c900000000ddc4411171f200c4e3c10c090e6e4f01dcdc6298c9c949f1a79ad0818194d800092ddd8f0b00c4a17ae64295007bf21c1c22ba22baa9a700002e3664644626cc4683b9080000000dc4e27d0ed2b2aad9c741af78470f73dc024c593e40d9f50f001e570000a858edc4037d092101c42119da3cb011000000e5c5c421fb5a1747cc474cf9f2400f118b7b000000c4216f5a0cdac421fd29fa002d08000000009b5d8ea7a7282856fe0564650f1b88000000a0a041574974ecd5c4c1cdc28a0000000000c5a2750831c44109f89700008020") syz_execute_func(&(0x7f0000000000)="f3410f7fd164ff0941c3c4617be66a02660f3a16649c6700c4617b12e5c441dfd04b00c442019dcc0f11d46f") syz_execute_func(&(0x7f0000001000)="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") 10:23:38 executing program 2: r0 = socket$packet(0x11, 0x100000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x200, 0xfe61) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'veth0_to_bridge\x00', 0x0}) bind$packet(r0, &(0x7f0000000640)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="050300000300000000000000c52cf7c21975e697b02f00066b2b2ff0dac8897c6b11876d886b6621d8d217ccd51cc5471d130a6632a88161a6fd8f24286a07d057c3be25", 0x44, 0x0, 0x0, 0x0) 10:23:38 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:23:38 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) fcntl$getown(r0, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) r1 = getpgid(0xffffffffffffffff) r2 = syz_open_procfs(r1, &(0x7f0000000000)='clear_refs\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000200)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') sendfile(r2, r3, 0x0, 0x1) ioctl$VHOST_VSOCK_SET_RUNNING(r2, 0x4004af61, &(0x7f00000000c0)=0x1) r4 = getpgrp(0xffffffffffffffff) ioctl$FS_IOC_SETVERSION(r3, 0x40087602, &(0x7f0000000080)=0x25b) r5 = syz_open_procfs(r4, &(0x7f0000000040)='net/udp\x00') ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r5) 10:23:38 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x0, 0x0, 0x3, 0x3, 0x0, 0x0, 0x1}, 0x20) 10:23:38 executing program 0: clone(0x503502001ff7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000400)="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") 10:23:40 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:23:40 executing program 0: syz_genetlink_get_family_id$tipc(0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) clone(0x503502001ff7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000400)="c4e379614832074a2be92cbd980f0544dbeac4a37bf0c50141e2e9c4c3295cd00066d995f2144006c4c21108907d50000036f344a7c46379169d0a000000a3660fd46315fb0000000c67470f0fb1fb0f0002a7c461b1e60f10837a580000f30f5bc9ae02098c8c859ecf491e2f16c2e54cc54cbec5a44d0f2c718f56ee0fa80f1fc4f02ab059596a0f016a0fc4227d79d492f083515959437b47ffad0a00106766410f3a162888c423c96cb83d000000fe66410fd1e426760fdf53091b6bd10404e1430fac2f6a6a66850f6eb45b0008804141d8d8a1a12ad7642636a30ff360313143fd6c5a0c5900121230f34a4add9c32c4a1e816355ad5000066400fdca0ef00000026657346afd93652f1f1d8000f092ddd8f0b006546d9ffc4a174149b5e000000ffd2fb2e36646466264681b908000024000dc4c2d3f50b8fe878c12fff66654ffc5f77c461c05ff8c9c403790445fe0a4304db6589890000e20070c4ef4ec4ef4e47dec84c593ef3460fe6c4b3dd676566f20f1a25ea656fc9cd58662666470f3a0e3900f20856213e660f56a200000000e5c4b15f8600000fa2045c47ccf92f5c6542833fdf64410f18d41809c4c18c14a700088041c421f973ff00a9bb000042c4414974ecd5603105fbfba2750831a8") 10:23:41 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 10:23:41 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000700)='./file1\x00', 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, 0x0) r1 = creat(&(0x7f0000000280)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7887, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() process_vm_writev(r2, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000000)) sched_setscheduler(r2, 0x5, &(0x7f0000000040)) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0be2e8be9442e55aed0cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da762"]) chdir(&(0x7f0000000380)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') dup2(0xffffffffffffffff, 0xffffffffffffffff) 10:23:41 executing program 3: r0 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000700)='./file1\x00', 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, 0x0) creat(&(0x7f0000000280)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() fsetxattr$security_evm(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sched_setscheduler(r1, 0x0, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0be2e8be94"]) chdir(&(0x7f0000000380)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') dup2(r0, 0xffffffffffffffff) 10:23:41 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:23:41 executing program 4: socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0xb, &(0x7f0000000180)=""/118, 0xffffffffffffff25) r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000080), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) unshare(0x40000000) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000040)={'lapb0\x00', {0x2, 0x4e20, @multicast1}}) 10:23:43 executing program 2: prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:23:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x9, 0x101}, 0x3c) [ 2789.391012][ C1] net_ratelimit: 24 callbacks suppressed [ 2789.391020][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2789.391074][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2789.396742][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2789.414050][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2789.420021][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2789.471015][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2789.476859][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2789.790989][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2789.796861][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2789.871001][ C0] protocol 88fb is buggy, dev hsr_slave_0 10:23:45 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:23:45 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, 0x0) 10:23:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x9, 0x101}, 0x3c) 10:23:47 executing program 0: syz_open_dev$vbi(0x0, 0x1, 0x2) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) getsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f0000000080)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000000380)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, &(0x7f0000000600), 0xffffffffffffffff) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'lo\x00'}, 0x18) ioctl(0xffffffffffffffff, 0x800000000008982, &(0x7f0000000000)) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000000400)=""/243, 0xf3}], 0x1, 0x0) close(r1) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) 10:23:48 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:23:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) recvmsg(r1, &(0x7f0000002bc0)={0x0, 0x0, 0x0}, 0x0) shutdown(r1, 0x0) 10:23:50 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2795.631007][ C0] net_ratelimit: 23 callbacks suppressed [ 2795.631016][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2795.631041][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2795.636749][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2795.642575][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2795.663090][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2795.710985][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2795.716810][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2796.031007][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2796.036830][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2796.110995][ C0] protocol 88fb is buggy, dev hsr_slave_0 10:23:51 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./bus/file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x80, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="00006dcac8431f3be48a2b6e05a7f015673834df226e7afbcd040000ab80"], 0x1e) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) r2 = gettid() perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4000000000010001, 0x200, 0x3, 0x0, 0x7, 0x1208, 0xf, 0x7, 0xfff, 0x1, 0x10000, 0x0, 0x7a2a, 0x3, 0x5, 0x3, 0x3, 0x2, 0x4, 0x10000, 0x0, 0x9, 0x2000000005, 0x9, 0xffffffffffffffff, 0x7, 0x4, 0x3, 0x8001, 0x2, 0x20, 0xfffffffffffffffd, 0x0, 0x8, 0x5, 0x0, 0x100000000, 0x0, @perf_config_ext={0x3ec1, 0x3}, 0x1000, 0x3f, 0x5, 0x9, 0x8, 0x0, 0x100000000}, r2, 0x3, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) 10:23:52 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) recvmsg(r0, &(0x7f00000005c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000740)=[{0x0}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[], 0x0) syz_execute_func(&(0x7f00000001c0)="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") [ 2801.870992][ C0] net_ratelimit: 23 callbacks suppressed [ 2801.871001][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2801.871027][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2801.876758][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2801.882587][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2801.899738][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2801.950995][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2801.956832][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2802.271005][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2802.276842][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2802.351027][ C0] protocol 88fb is buggy, dev hsr_slave_0 10:24:00 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$int_out(r0, 0x2000810080004515, 0x0) 10:24:00 executing program 0: pause() syz_execute_func(0x0) syz_execute_func(0x0) 10:24:00 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:24:00 executing program 3: r0 = shmget(0x3, 0x1000, 0x200, &(0x7f0000ffc000/0x1000)=nil) shmctl$SHM_LOCK(r0, 0xb) unshare(0x8000400) r1 = mq_open(&(0x7f0000000040)='.selinux\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x406, r1) write$P9_RSETATTR(r2, &(0x7f0000000080)={0x7, 0x1b, 0x1}, 0x7) r3 = getpid() sched_getattr(r3, &(0x7f0000000000), 0x30, 0x0) restart_syscall() clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_mreq(r2, 0x0, 0x23, &(0x7f0000000140)={@dev={0xac, 0x14, 0x14, 0x23}, @empty}, 0x8) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f00000000c0)) wait4(0x0, 0x0, 0x80000000, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) writev(r4, &(0x7f0000000a80)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1) pselect6(0x40, &(0x7f0000000100)={0xb, 0x7, 0x0, 0x7, 0x0, 0x7, 0x3, 0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0) 10:24:00 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000040)=[{r0}], 0x1, 0x0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) 10:24:00 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'bond0\x00', &(0x7f0000000040)=@ethtool_link_settings={0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}) 10:24:02 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) bind$packet(r1, &(0x7f0000000100)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @random="f004519676a8"}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x2, 0x4) io_setup(0x1e, &(0x7f0000000180)=0x0) io_submit(r3, 0x1, &(0x7f0000000080)=[&(0x7f0000000540)={0x3000000, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000040), 0x29c}]) [ 2808.111007][ C0] net_ratelimit: 23 callbacks suppressed [ 2808.111015][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2808.111041][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2808.116787][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2808.122567][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2808.139705][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2808.190988][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2808.196814][ C1] protocol 88fb is buggy, dev hsr_slave_1 10:24:03 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000005c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f0000000580)=""/27) [ 2808.511023][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2808.516869][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2808.591005][ C0] protocol 88fb is buggy, dev hsr_slave_0 10:24:05 executing program 3: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) 10:24:05 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:24:05 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_execute_func(&(0x7f0000000640)="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") ioctl$KVM_GET_MP_STATE(r2, 0x8004ae98, 0x0) 10:24:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000006c0)=0x1ff, 0x5) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000000c0), 0x2ba) recvmsg(r1, &(0x7f00000005c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000740)=[{&(0x7f0000003ac0)=""/4096, 0xd400}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") 10:24:06 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000000)) 10:24:06 executing program 2: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000006, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0x802c550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x740000, 0xffffffff7ff0bdbe}) 10:24:08 executing program 5: 10:24:08 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:24:08 executing program 2: 10:24:09 executing program 0: [ 2814.350995][ C0] net_ratelimit: 23 callbacks suppressed [ 2814.351004][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2814.351030][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2814.356731][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2814.362537][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2814.379679][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2814.430980][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2814.436802][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2814.751013][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2814.756836][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2814.830988][ C0] protocol 88fb is buggy, dev hsr_slave_0 10:24:10 executing program 3: 10:24:10 executing program 5: 10:24:10 executing program 2: 10:24:10 executing program 0: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\b\x00\x00\xf9\xff\x85nG\x13g\xa6\x05', 0x0) flock(0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r1, r0, 0x0, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:24:10 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x4009}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8942, &(0x7f0000000040)='nr0\x01:\xf2.\xa3\'>\xf8]\x81$?\xfa\xbf1UM\xbf\xef\xa9\xac\x03x\xf4D3A}?\x00\x8b\x9c[\xdd\x06\xa44\xf4\x94\xa8>\xb1\xb1\xa2_&') 10:24:10 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec7) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000080)={0x30001}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:24:11 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$mixer(0xffffffffffffff9c, 0x0, 0x28000, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x400000}}) 10:24:12 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:24:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x9, 0x101, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xffffffffffffffff}, 0x3c) 10:24:13 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2820.591004][ C0] net_ratelimit: 24 callbacks suppressed [ 2820.591012][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2820.591038][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2820.596761][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2820.602599][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2820.619747][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2820.671006][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2820.676879][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2820.991031][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2820.996870][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2821.070982][ C0] protocol 88fb is buggy, dev hsr_slave_0 10:24:16 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:24:17 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:24:18 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$mixer(0xffffffffffffff9c, 0x0, 0x28000, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x400000}}) 10:24:18 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:24:19 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:24:20 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2826.830990][ C0] net_ratelimit: 23 callbacks suppressed [ 2826.830998][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2826.831023][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2826.836732][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2826.843277][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2826.860437][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2826.910998][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2826.916837][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2827.231061][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2827.236907][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2827.310982][ C0] protocol 88fb is buggy, dev hsr_slave_0 10:24:28 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:24:28 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:24:28 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:24:28 executing program 4: accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000003c0)=0x14) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x400000, 0x0) syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffff9c) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) getdents(0xffffffffffffffff, 0x0, 0xfffffffffffffd47) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x78, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r2, r1, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x3e3) write$binfmt_script(0xffffffffffffffff, 0x0, 0x2db) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 10:24:28 executing program 2: accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000003c0)=0x14) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x400000, 0x0) syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffff9c) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) getdents(0xffffffffffffffff, 0x0, 0xfffffffffffffd47) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x78, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r2, r1, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x3e3) write$binfmt_script(0xffffffffffffffff, 0x0, 0x2db) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 10:24:28 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2833.071009][ C0] net_ratelimit: 23 callbacks suppressed [ 2833.071017][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2833.071043][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2833.076755][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2833.082588][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2833.099792][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2833.150985][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2833.156808][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2833.471022][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2833.476884][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2833.550993][ C0] protocol 88fb is buggy, dev hsr_slave_0 10:24:29 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:24:29 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:24:29 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2834.559704][T29648] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2835.413738][T29648] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 10:24:31 executing program 3: accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000003c0)=0x14) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x400000, 0x0) syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffff9c) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) getdents(0xffffffffffffffff, 0x0, 0xfffffffffffffd47) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x78, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r2, r1, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x3e3) write$binfmt_script(0xffffffffffffffff, 0x0, 0x2db) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 10:24:32 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:24:33 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:24:33 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:24:33 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2839.162177][T29648] net_ratelimit: 24 callbacks suppressed [ 2839.162187][T29648] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 10:24:34 executing program 4: accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000003c0)=0x14) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x400000, 0x0) syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffff9c) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) getdents(0xffffffffffffffff, 0x0, 0xfffffffffffffd47) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x78, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r2, r1, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x3e3) write$binfmt_script(0xffffffffffffffff, 0x0, 0x2db) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 2839.310985][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2839.311019][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2839.316803][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2839.322894][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2839.334326][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2839.391893][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2839.398621][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2839.711023][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2839.716865][ C1] protocol 88fb is buggy, dev hsr_slave_1 10:24:35 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:24:35 executing program 2: accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000003c0)=0x14) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x400000, 0x0) syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffff9c) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) getdents(0xffffffffffffffff, 0x0, 0xfffffffffffffd47) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x78, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r2, r1, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x3e3) write$binfmt_script(0xffffffffffffffff, 0x0, 0x2db) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 10:24:36 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2842.127849][T29712] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 10:24:37 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x40, &(0x7f00001cb000/0x1000)=nil}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:24:37 executing program 3: accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000003c0)=0x14) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x400000, 0x0) syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffff9c) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) getdents(0xffffffffffffffff, 0x0, 0xfffffffffffffd47) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x78, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r2, r1, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x3e3) write$binfmt_script(0xffffffffffffffff, 0x0, 0x2db) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 10:24:38 executing program 5: accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000003c0)=0x14) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x400000, 0x0) syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffff9c) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) getdents(0xffffffffffffffff, 0x0, 0xfffffffffffffd47) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x78, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x3e3) write$binfmt_script(0xffffffffffffffff, 0x0, 0x2db) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 10:24:38 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2845.027296][T29712] net_ratelimit: 25 callbacks suppressed [ 2845.027305][T29712] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2845.551023][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2845.551058][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2845.556875][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2845.562680][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2845.574153][ C1] protocol 88fb is buggy, dev hsr_slave_1 10:24:40 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x40, &(0x7f00001cb000/0x1000)=nil}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2845.630985][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2845.637144][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2845.951031][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2845.956870][ C1] protocol 88fb is buggy, dev hsr_slave_1 10:24:41 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00', 0x800}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x40, &(0x7f00001cb000/0x1000)=nil}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:24:42 executing program 2: accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000003c0)=0x14) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x400000, 0x0) syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffff9c) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) getdents(0xffffffffffffffff, 0x0, 0xfffffffffffffd47) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x78, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r2, r1, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x3e3) write$binfmt_script(0xffffffffffffffff, 0x0, 0x2db) recvmsg(r1, 0x0, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 10:24:44 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x40, &(0x7f00001cb000/0x1000)=nil}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2850.111004][ C1] net_ratelimit: 20 callbacks suppressed [ 2850.111013][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2850.122572][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2850.190986][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2850.196802][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:24:45 executing program 3: accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000003c0)=0x14) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x400000, 0x0) syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffff9c) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) getdents(0xffffffffffffffff, 0x0, 0xfffffffffffffd47) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x78, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r2, r1, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x3e3) write$binfmt_script(0xffffffffffffffff, 0x0, 0x2db) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 10:24:45 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00', 0x800}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x40, &(0x7f00001cb000/0x1000)=nil}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:24:46 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2851.790985][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2851.791018][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2851.796804][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2851.802675][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2851.814244][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2851.870995][ C1] protocol 88fb is buggy, dev hsr_slave_0 10:24:47 executing program 0: accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000003c0)=0x14) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x400000, 0x0) syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffff9c) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) getdents(0xffffffffffffffff, 0x0, 0xfffffffffffffd47) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x78, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r2, r1, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x3e3) write$binfmt_script(0xffffffffffffffff, 0x0, 0x2db) recvmsg(r1, 0x0, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 10:24:48 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00', 0x800}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x40, &(0x7f00001cb000/0x1000)=nil}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:24:49 executing program 2: syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00', 0x800}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x40, &(0x7f00001cb000/0x1000)=nil}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2855.670731][T29779] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2855.699977][T29779] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2855.950988][ C0] net_ratelimit: 16 callbacks suppressed [ 2855.950996][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2855.951023][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2855.956738][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2855.962551][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2855.979702][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2856.030984][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2856.036802][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2856.351050][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2856.356898][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2856.431314][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2862.191007][ C1] net_ratelimit: 23 callbacks suppressed [ 2862.191016][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2862.191055][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2862.196752][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2862.214095][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2862.219888][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2862.270988][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2862.276826][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2862.591039][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2862.596872][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2862.671028][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2868.430990][ C1] net_ratelimit: 22 callbacks suppressed [ 2868.431000][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2868.431005][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2868.431062][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2868.436717][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2868.459847][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2868.465659][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2868.510990][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2868.516837][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2868.831028][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2868.836869][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2874.671019][ C1] net_ratelimit: 24 callbacks suppressed [ 2874.671028][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2874.671064][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2874.676750][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2874.694068][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2874.699847][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2874.751091][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2874.756912][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2875.071045][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2875.076887][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2875.150996][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2880.910974][ C0] net_ratelimit: 25 callbacks suppressed [ 2880.910983][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2880.911008][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2880.916725][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2880.922556][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2880.939689][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2880.991010][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2880.996923][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2881.311034][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2881.317169][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2881.391017][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2887.151006][ C0] net_ratelimit: 24 callbacks suppressed [ 2887.151014][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2887.151038][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2887.156739][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2887.162531][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2887.179672][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2887.230976][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2887.236824][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2887.551031][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2887.556844][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2887.631008][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2893.391021][ C1] net_ratelimit: 24 callbacks suppressed [ 2893.391030][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2893.391074][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2893.396764][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2893.414136][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2893.420016][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2893.470989][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2893.476828][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2893.791039][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2893.796867][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2893.870986][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2899.631048][ C1] net_ratelimit: 23 callbacks suppressed [ 2899.631058][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2899.641036][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2899.642579][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2899.649813][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2899.655604][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2899.667017][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2899.710993][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2899.716821][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2900.031026][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2900.036865][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2905.870993][ C0] net_ratelimit: 24 callbacks suppressed [ 2905.871001][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2905.871028][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2905.876738][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2905.882569][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2905.899746][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2905.951023][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2905.956962][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2906.271013][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2906.276838][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2906.350991][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2912.111014][ C0] net_ratelimit: 22 callbacks suppressed [ 2912.111023][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2912.111051][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2912.116759][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2912.122604][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2912.139744][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2912.190995][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2912.196831][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2912.511059][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2912.516881][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2912.590988][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2918.350988][ C0] net_ratelimit: 24 callbacks suppressed [ 2918.350996][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2918.351023][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2918.356757][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2918.362568][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2918.379745][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2918.431021][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2918.436919][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2918.751046][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2918.756876][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2918.831007][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2924.591025][ C1] net_ratelimit: 25 callbacks suppressed [ 2924.591033][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2924.591069][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2924.596778][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2924.614933][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2924.620723][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2924.670995][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2924.676826][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2924.991026][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2924.996853][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2925.070995][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2930.830978][ C0] net_ratelimit: 24 callbacks suppressed [ 2930.830986][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2930.831012][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2930.836731][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2930.842542][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2930.859745][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2930.910990][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2930.916810][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2931.231007][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2931.236836][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2931.310988][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2937.071026][ C0] net_ratelimit: 24 callbacks suppressed [ 2937.071034][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2937.071062][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2937.076768][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2937.082603][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2937.100003][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2937.150994][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2937.156822][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2937.471021][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2937.476839][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2937.550986][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2943.311008][ C0] net_ratelimit: 23 callbacks suppressed [ 2943.311016][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2943.311042][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2943.316746][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2943.322572][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2943.339784][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2943.391013][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2943.396867][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2943.710988][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2943.716822][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2943.790998][ C0] protocol 88fb is buggy, dev hsr_slave_0 10:26:20 executing program 5: 10:26:20 executing program 3: accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000003c0)=0x14) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x400000, 0x0) syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffff9c) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) getdents(0xffffffffffffffff, 0x0, 0xfffffffffffffd47) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x78, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r2, r1, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x3e3) write$binfmt_script(0xffffffffffffffff, 0x0, 0x2db) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 10:26:20 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:26:20 executing program 2: syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00', 0x800}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x40, &(0x7f00001cb000/0x1000)=nil}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:26:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') writev(0xffffffffffffffff, &(0x7f000000a300)=[{&(0x7f000000a3c0)='y', 0x1}], 0x1) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x40, &(0x7f00001cb000/0x1000)=nil}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:26:20 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x3cd) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @broadcast}, 0x10) sendto(r0, &(0x7f0000000180)="ce8e6e41dd5b63902ea431141169de4cfa2970af", 0x14, 0x0, 0x0, 0x0) 10:26:22 executing program 2: syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00', 0x800}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x40, &(0x7f00001cb000/0x1000)=nil}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:26:22 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:26:22 executing program 0: r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$sock_timeval(r1, 0x1, 0x15, 0x0, &(0x7f0000000240)) memfd_create(0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x72, 0x4) ioctl$FIGETBSZ(r0, 0x2, &(0x7f00000001c0)) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000140)=""/56) bind$inet(r3, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x5b, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) ioctl$PPPIOCSCOMPRESS(0xffffffffffffffff, 0x4010744d) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, 0x0, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000000)=0xda9, 0x4) r4 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) sendmsg$TIPC_NL_PEER_REMOVE(r4, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x28, r2, 0x0, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x840}, 0x4) 10:26:22 executing program 3: accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000003c0)=0x14) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x400000, 0x0) syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffff9c) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) getdents(0xffffffffffffffff, 0x0, 0xfffffffffffffd47) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x78, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r2, r1, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x3e3) write$binfmt_script(0xffffffffffffffff, 0x0, 0x2db) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 2947.866723][T29812] IPVS: ftp: loaded support on port[0] = 21 [ 2948.235943][T29812] chnl_net:caif_netlink_parms(): no params data found [ 2948.380039][T29812] bridge0: port 1(bridge_slave_0) entered blocking state [ 2948.417198][T29812] bridge0: port 1(bridge_slave_0) entered disabled state [ 2948.442054][T29812] device bridge_slave_0 entered promiscuous mode [ 2948.450361][T29812] bridge0: port 2(bridge_slave_1) entered blocking state [ 2948.511018][T29812] bridge0: port 2(bridge_slave_1) entered disabled state [ 2948.541157][T29812] device bridge_slave_1 entered promiscuous mode [ 2948.608367][T29812] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2948.655138][T29812] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2948.747294][T29812] team0: Port device team_slave_0 added [ 2948.802865][T29812] team0: Port device team_slave_1 added 10:26:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') writev(0xffffffffffffffff, &(0x7f000000a300)=[{&(0x7f000000a3c0)='y', 0x1}], 0x1) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x40, &(0x7f00001cb000/0x1000)=nil}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:26:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) close(r1) [ 2949.550999][ C0] net_ratelimit: 23 callbacks suppressed [ 2949.551007][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2949.551032][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2949.556743][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2949.562561][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2949.579702][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2949.630976][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2949.636791][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2949.951057][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2949.956878][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2950.030974][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2950.339364][T29812] device hsr_slave_0 entered promiscuous mode [ 2953.881391][T29812] device hsr_slave_1 entered promiscuous mode [ 2955.790980][ C0] net_ratelimit: 24 callbacks suppressed [ 2955.790988][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2955.791016][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2955.796723][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2955.802533][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2955.819680][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2955.870980][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2955.876803][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2956.191009][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2956.196845][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2956.271021][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2957.721090][T29812] bridge0: port 2(bridge_slave_1) entered blocking state [ 2957.728200][T29812] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2957.735601][T29812] bridge0: port 1(bridge_slave_0) entered blocking state [ 2957.743147][T29812] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2959.211214][T29061] bridge0: port 1(bridge_slave_0) entered disabled state [ 2960.557861][T29061] bridge0: port 2(bridge_slave_1) entered disabled state [ 2962.031005][ C0] net_ratelimit: 24 callbacks suppressed [ 2962.031013][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2962.031039][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2962.036753][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2962.042618][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2962.059770][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2962.110998][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2962.116816][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2962.431017][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2962.436853][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2962.511036][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2968.270973][ C1] net_ratelimit: 22 callbacks suppressed [ 2968.270981][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2968.271022][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2968.276703][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2968.294061][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2968.299836][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2968.351008][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2968.356842][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2968.671000][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2968.676821][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2968.751016][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2974.511008][ C0] net_ratelimit: 24 callbacks suppressed [ 2974.511016][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2974.511042][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2974.516747][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2974.522567][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2974.539789][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2974.590998][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2974.596833][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2974.911025][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2974.916848][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2974.990988][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2976.385196][T29812] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2976.443675][T20322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2976.452186][T20322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2976.462653][T29812] 8021q: adding VLAN 0 to HW filter on device team0 [ 2976.512051][T20322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2976.520802][T20322] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2976.561379][T20322] bridge0: port 1(bridge_slave_0) entered blocking state [ 2976.568500][T20322] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2976.611346][T20322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2976.642438][T20322] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2976.681382][T20322] bridge0: port 2(bridge_slave_1) entered blocking state [ 2976.688519][T20322] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2976.741294][T20322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2976.791719][T20322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2976.800520][T20322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2976.856988][T20322] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2976.890474][T29812] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2976.955728][T29812] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2976.984764][T29657] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2976.993518][T29657] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2977.022120][T29657] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2977.030742][T29657] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2977.111550][T29657] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2977.120153][T29657] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2977.181604][T29657] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2977.208053][T29812] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2977.228508][T27289] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 10:26:52 executing program 5: preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x0, 0x42, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000006, 0x0) 10:26:52 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:26:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') writev(0xffffffffffffffff, &(0x7f000000a300)=[{&(0x7f000000a3c0)='y', 0x1}], 0x1) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x40, &(0x7f00001cb000/0x1000)=nil}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:26:52 executing program 0: r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$sock_timeval(r1, 0x1, 0x15, 0x0, &(0x7f0000000240)) memfd_create(0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x72, 0x4) ioctl$FIGETBSZ(r0, 0x2, &(0x7f00000001c0)) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000140)=""/56) bind$inet(r3, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x5b, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) ioctl$PPPIOCSCOMPRESS(0xffffffffffffffff, 0x4010744d) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, 0x0, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000000)=0xda9, 0x4) r4 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) sendmsg$TIPC_NL_PEER_REMOVE(r4, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x28, r2, 0x0, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x840}, 0x4) 10:26:52 executing program 3: accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000003c0)=0x14) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x400000, 0x0) syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffff9c) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) getdents(0xffffffffffffffff, 0x0, 0xfffffffffffffd47) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x78, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r2, r1, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x3e3) write$binfmt_script(0xffffffffffffffff, 0x0, 0x2db) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 10:26:52 executing program 2: ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000006, 0x0) 10:26:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000005c0)="985e4aa84a1c6d0f05f359bf22000000c4a37bf0c54041e2ebe2a2363e460f1a7000660ffc97660f6b32fb0fb8c4014e4e660fde8e9f000000c4016d7d14dec4a2513c06b921045fc507f240d1d2c4e10bf8c45b0fb1f0c66db712c483397fd300f7dcdc0fbcaf10009ec4c27d0a21ac6161c4c3214cb9a5605419c201b04bd59700cfcf8171a30b8a826eefa80dd4d48cc7e890306c0864360fe258009e698de3c0bf26264788fec4a1dd7dbbbfdd5cc6c46249bedc32a1c9fb1166470f383a4d4b") 10:26:52 executing program 5: ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001d40), 0x0, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\b\x00\x00\xf9\xff\x85nG\x13g\xa6\x05', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r1, r0, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) 10:26:53 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @multicast1}, @icmp=@address_reply={0x2b6}}}}}, 0x0) 10:26:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x101000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r2 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r2, &(0x7f0000009400)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$sock_int(r2, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) recvmsg(r2, &(0x7f0000002bc0)={0x0, 0x0, &(0x7f0000002b40)=[{0x0}, {&(0x7f0000001b40)=""/4096, 0x1000}], 0x2}, 0x0) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r2, 0x0) 10:26:53 executing program 5: userfaultfd(0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x89e9, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001d40)=[{{&(0x7f0000001a00)=@llc={0x1a, 0x0, 0x20, 0x8, 0x7f8d, 0x5}, 0x80, &(0x7f0000001d00)}, 0x7fffffff}], 0x1, 0x20004010) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\b\x00\x00\xf9\xff\x85nG\x13g\xa6\x05', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r1, r0, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) 10:26:53 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000006c0)=0x1ff, 0x5) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000000c0), 0x2ba) recvmsg(r0, &(0x7f00000005c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000740)=[{&(0x7f0000003ac0)=""/4096, 0xd400}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) syz_execute_func(&(0x7f00000001c0)="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") 10:26:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') writev(0xffffffffffffffff, &(0x7f000000a300)=[{&(0x7f000000a3c0)='y', 0x1}], 0x1) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00', 0x800}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x40, &(0x7f00001cb000/0x1000)=nil}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:26:54 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:26:54 executing program 5: accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000003c0)=0x14) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x400000, 0x0) syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffff9c) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) getdents(0xffffffffffffffff, 0x0, 0xfffffffffffffd47) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x78, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r2, 0x1, 0x0, &(0x7f0000000100), 0x4) dup3(r2, r1, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x3e3) write$binfmt_script(0xffffffffffffffff, 0x0, 0x2db) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 2979.634122][ C0] net_ratelimit: 32 callbacks suppressed [ 2979.634130][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2979.647570][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2980.039682][T29919] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2980.131470][T29919] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2980.750982][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2980.751172][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2980.756836][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2980.762596][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2980.774303][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2980.780179][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2980.831004][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2980.837121][ C1] protocol 88fb is buggy, dev hsr_slave_1 10:26:58 executing program 0: accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000003c0)=0x14) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x400000, 0x0) syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffff9c) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) getdents(0xffffffffffffffff, 0x0, 0xfffffffffffffd47) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x78, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, 0x0, 0x0) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r2, r1, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x3e3) write$binfmt_script(0xffffffffffffffff, 0x0, 0x2db) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 10:26:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') writev(0xffffffffffffffff, &(0x7f000000a300)=[{&(0x7f000000a3c0)='y', 0x1}], 0x1) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00', 0x800}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd0") ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x40, &(0x7f00001cb000/0x1000)=nil}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:26:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$IMCLEAR_L2(0xffffffffffffffff, 0x80044946, &(0x7f0000000080)=0x9e) setsockopt$inet6_dccp_int(r0, 0x21, 0x15, &(0x7f0000000040)=0x7f, 0x4) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000280)='trusted.overlay.origin\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000380)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000300)=@buf={0x1000, &(0x7f0000000580)="b374b0393d829cc39369e6e83fa704f2d23586ed3741ce3a6fc2a598e74bcfa90881ae21543ac93b5fb6e23315c5532e79ad628ad19e893d7aef2f9d32636e8126f81088706ada52034194a4f304ee41cb4ede4f14546fce9e4145c4fedd0cd07aff4cc99e56789e9df9a95479785bddaf08fdeb2f5e4833ac8402c8fef6ebaa90677c7ee3ebb22fe56667b93325e0845fbe6bd8f0ef568b0ad37563962b47914458b506cd457141190e9819288b32be59de350c30cd825ed7e6fd87c1084b467810f9182e7647da2c2826da2e82a4bace18c8cf27767dabea5ac367fd903e800710d7808d5e18683cad2e69f2422577bf9e64fb6c987e23d54b953e65364d5c622957ff815484131f97d80e5b49a4bdea47dc015599186b9c8c11c7187e31e0066b758160b7fc1f7cef11d42055525758f4104fea515e83c2ea67858ca6d43884e7b21624edc15078d473f70c18f9ae66ff663cb13b51faf6116f9ac986b1e1faec2cc13ef3d261a807280104f898ec7566d2ca2a7b816d5fb14dcd9d02e59a981b42a0b152c2fa527efb50306f762efd5f8aac64dd4809cf928992e5fd69b4133892d39c860bea3b9dad196f1d6b1bda5249712146dc204fae71adaab06dc17b5b9f41a83cb21d5156c50b24b0c96be63ee83aa9afc3620eb994bd7ca891d12ed809220bc1f3da90f7c61d604f9b25029104ba96b6d5eb96b156c9cc9254646f8bf71f70afd615bc93c6d4565f109e9793c77b8a9215de2d404394bbbebfc6e916448fda037400ca644bd77d9a755369cc4770db8720149f17f0d5832e3daacf71510a560158adcc2478f92637dd675a7ca238c639496e0a7ccd64f4a8d1ac221739a3be4dffe564dcf9ae41cd79841781da64020d2e41234d9f104cd4a1a16e24872705f4b7e12341e56293f1305e47faa6143e3b8f3de9811c2eb49ef09c260ee8fa173f2f4b4a63367d96d43f3503f188a7280b54aa2c8062acf67bede51a261ce8c89ae57a19f902eb26058e1dca7847cfa0f0705ea2531fc4010f5a59d262bccb255bdfa9c87572c7e25d2cf08f99b1f911614dfdad055a5c48a7e1e07db897d20008f8effa2fcb7e55ff50ae43a49828ecf20daefbb91a88dca2a689ae90abf6f1d26c4106531a721660788edeb1e56b0558ae5e5b8dcc4867bb1a7c63414cd5cef4f05cc2ce81e318a8a6fc49346cbea2d5242ef86163dd3073943f91b17b238c4a4c6806e28b29ad9865bcf4ff198f3cd7b99b7176a3122d73ae7fef8c033a1cfe2dab313522bf659f2cfa967e73727864777acb8bc671096729b446f911cb01008b08115d792846ae4d579c8c4a9936683a255cb9fe000347b53a2230b2c69bfa6cfcb1558266a48f68634cedf147634907442b66c6a0ed0ba026390c19f82163ebc2dd9da44f33773d58b85c0f21a86d64af3b520758c54c114029226d4d7f1d4c889b5a1fc979b3c2bb33c729b919dd28479e6cdc752fc2c0cc09e3e641659e105f04c1c53f38a60d8cc796cb54a5b5347afb9b10961aa831a667e7d4f02df9323f5521ab2c9803e01d0d68fbe38ba4df860d18974e756d0d15884054dc6d79eae0c1be35b93c41112bd2582d06b5a2297aa9497647e76d5f4ed2388ef392b0d88400bd4d20aca2c6184c37fddec13d13ccc2220ba5eea249fc6ce788ca73d011439e4385eca9e6cf8430e931d7044b6f9585dfc16ed0175b706fd53009e7354e9f02566840cd7cccccbbfc95b5d4c93c8f4a5165cf3b4630d687d414f63b1b2a2b8510c959911e6ae721df215734b1a0d443facb59ee24146466a1572661d7b9af1272cf9d2c05821531b1c99558d4c77809fd0615456799dde24faff254fe574240a157037bbddf8a4551b28632d5fdb2b22385c74e92ffe0ef8462f0b0845ffcef6e63f3f34799c04018e1e6527af7e045b07ef4d379e45ed5a53afceb8494dab5d997ec4dc61b50ba206940cf7b27e69adc46125ce3cbc0bb7e4e1fd822e430cec3bb8da75ffb3dffb7a4944b400f3312cc06b5dcc71f2a59980ccbd2b199d59a4305234e959f9231d8a62a9f98ff09a50220b5603d266036ac0cbe2251b4757811086f0735d34f6f88646ce1a0d1bf16a66896b37cfcbc59be36b1b301756ec56c11ca6e6741c654fb468c5bb395f6b64c82d3c1bbd2b1e132ab2257c0b9b231bd2211073b7bb1f0b03a8e8f9cfd15691172d2e5e23fa445e4786490c4d179ce8b64aba4adcae5cad396123b5c4282a90741440f1be418975e49d4ea1d97db4f5673b93e8ceab83dfea50a5e14339a4ff6c628400588c2e3ae6561039e03923a6479f8a896351725ff5f53d914cb3346924ec6ae0d922533a162cedfdfda2ca8601b7fb86a70925786d3f3d40d9cdfcbde5ad635d8066225d4a8d18e7e806454bdf89eb9bde52c92557c9870b238a7ed32917b905bab27d385b513a48a79c1c8dabc5df77269f9b964b3c2604ccb5dbfef58efdd6684a588fe7cf61db924d17d64c71539799448f4569df8eec6cd3790d012006db763adaddcc6b95d6cf634393b392cba9140039a130aaf6ec6563f91f32bf32963abeb8620ba21c4dd3c006cd251404fb1aefaa0da994c2ecc541cca335b9ff2d48352b9decad22e6687c8937260d262790206f8b8b57e868af1dbd51bb061dd53f15159942507e117c4460d1e94f32dc21bba74ac43bd35cb170c90417abf5f42741766d4f1b35230570cd49e96c9848e98d776e62894a4dd928c502d276a11b84a5f17b9778378330a8b4d2fd24d1ece99477a07bafa4c865ec515d3b2cc189d1bbbd2cd51681d058dee80841edf42abac65483cc6858ecb70139d0fec1841c233247707838ce4447c99207b7cff4fd8a4845c2c93c7372cec379e831aa3dd58a4eee1012270aa889b687b96f360950c4a9486540765515c769b365af19a6ae0f276b0a7d12c00223cce5099633329fcb21b73eb8d9bc2959d52a6d46804bd4b6e08b9d78c4d4da33b1989dcfec906339bd74e006b2586c35c3d151646218e352be439a3da0d3e403c2399f82db79d5904e2029423b5a3df2d2d5880f179d56d66609eed11d3820745e597f4ed1e6c2a273febfde72d0f94b3001316e2a5e569a62f36c0ba12b13bb8e2e3c3e766f6fc70875ebdc4d598acce598214571253a6917cf5e068bd994f18992a8ecb5a624eb440ba31212a7ce838d380cf4acdecd4d0df06aa0ba56469f71874b98ea582b1558bab4afb5799812448787a51b2d8563bca5805fe2246b89041f49622d361c38537435e9a9323e330899a0d1284bc40341d193c67abefca1d3e76f2b8e80cd3daabdb646a3178cc7ffbbda8894099ada23b1aefe2aa54e7671bb66deaa27e5194625e56d07b141bdbcce99bdc6b8169e149b414b9c8917df796794f4200b2ce39c5f7435348d4947fce17c5eb561a49448b03bcb5e793dfdf9900a9c0402b8467063b383a40a0d6231019f393e0f3ef7de11db5d01593965d467374e9451fe76f9fe7eb3e409da3178efd9325c5b9e84eca1c84c4a5ed5cf3dc77160885d56e600629399d9e89b15ba9dba44e2b9cd6651b15ace5735bd3f50d711799cf5c85ac47c62f3eaf83f7f547469b23a05dcd116c4523ce748ba30c71774bc87081729db5d112004aa8a47da515a6623b707c7e580495c6b798b0d1b10db9ec543068a67d59dfc1f67760debb4d630bfaab40f852b35ef14f76f5659f763aa8d9183d31ff67adb719d6411e059ed010c7fb2340766380c67a04b0845763ddfb7278cbfe689dbc7a0b2408192ef16ae9ade1a545ea6cc970536a1063d0687af81453cd64b8769058787d3132856e68ae7d8c998c21ddc88688e3dcf0acec17bc9a138ec7cbe188db56d8f0d4725db995777b4acca843c2f97d80dac7b0862b4bc31ebeca505e3f3a68851a8a4c5c6890def33bcffff33b0c20a5ce97f39dc8c3ba56c4165119fcd9f5080ed4082354bc7e3803b4e3078041f0ea3cd9d90b2d011a9dcd54702909f866215afd8f86cf5d1c1712ee939639d0999ac13ea734e101c58925bd398a26c043a0d18352805887d9290148ad276485265f6e785274db088dab01cba49caeb68bd09a3dde1ac8ec81305407890466d0fdd16783129cc1a4728a805a83d4fd13e95d34391f647562b7b2ade817a404686ad642468f21aa53f680bb50204ed6fbe81fea0c2179f1bb91c1f6087fa8583aad5fe54ce9f2580a2dcf20fceb77ad439aa3bfa8da48c9833e04f5d77ce09b516dd3d0874dc19fb94845b40fc4ec960bcd1200a8de757182660c634acd0d1426cd4864b48af51da8bb625b420b382d7badf7c9deb1e631a9b6aad3a63407e9126d8b6555477d0c9adb66a8a29bce45c1de9302cad76d30f2bb02eb9870f5eeafe6c3153674a58e55338b771818cc33d7594bf66a194c830c9d9cef41d3e56f9a1b1695def5691a27e35ed6480edc6613081d55b6bfee977c655abd6d10c76a23422edc0cb529e2396df3ce0ad89c04b178a24f0d98b9fefc15ee09d85e199ab4ac9a2fe547d851ca9220592a42f766fbdfcab5fd94f22ca4fe36780d037e3f2572de8589835b21cbd4cff3f5702d5f7211ee7deaeaba032005500f96606b3e28474a28160bb8443bfc09025e75385aa77575ecff79b8ab4c9aed8a9e7c8d5cea76de75d010596d86d534711cc05d658da3fe7ae923f3a49b3555ef7c20d3beb55f89e776cbc9a3ccbd45719f88bce240eb5e60d8b200128415253251e55dc8c342b95bb25002b8f41179cc3cf7b02f5634014d6192dc366d486e5a770b53d9547c28e3e908e20f3d6362b2405ad0bf64a22aeb9e024a259860e613b94f8f1d57fe44f72fc1ecefb21933af2e961abfd1449c2b6c938587ff5080e161a0126c9e4b39e0f74279bac4863aac426285d9dd547d1e81669f602bf393680652a67c8c5a4e43087270fbba5000021caab235caf60c1c63a34c48a2fb28d67dfad6fd5d4478729087ac5e75ab86aa936b5d7f28867c84477b801afbeda9f21a0379a1c47eb8bc7c20230ba1cd563eabed5389440960ea96490214fe48cc3cf1c4199812ec884a64dc7cfed26a5551daf3cd1759591e32c2be944ce1d0b21ded80240e5014bce6ae9a52ba5bc9c935f63d7c6895d542613a27c2841f0075c499490cd6fd9e98b5d856af85f2d0a3b065af39ce874b460794d03a8bc5e73708e64743e22df0087f321b0fe401fe0889ae889551fceb000fcf9cf2dfaab404cc202384c9a59459d2a01221daba8ac899fa2dd3e9c6ea41a3fa43c5865860757b8028d21ff5f4ea5c13ea80c7448acadc76e2b9ba85aab00502f609ec60150e6d13e315d577f9d319d18c8685b695ca32af19ff87750094860a4986a97364b45f09ad05122cc2b562cb20cc4bac1c46d434116975818f34b5506f4dc80ad84563412a2c79fb238fe96df26bcee9ce3bc2ad1e238caa016973351ee09d04227aecb24632f65fa481343d7a02cf49ebd3109226dbcb83c501bb5f66469f55495468b1849966de734a13729395485a53729184f7af997afb1982d9cbfb4bba47bf1fd0396eee2d1133bcd25d7406480b59d790a32a84ce8c50e132332e93f92630596f0c505893b546b360d154e7f1248141c3d052dbfda6e2ba657d488f2328e43fa54d072866eecd2bacdc5202e9ba12b6d650e836c21fdf895f5d1019272a9d842b060010b9caa2dfc7efe6bb0694c43c042da3e61913253fac571385d536772bd2c1859ed3afe08bc884044a30ae11f6c28f87e267a9e036c86b80f83e40844d27db"}) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec7) ioctl$KVM_NMI(r3, 0xae9a) r4 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$PIO_UNIMAP(r4, 0x4b67, &(0x7f0000000140)={0x4, &(0x7f00000000c0)=[{0x7, 0xfffffffffffffffa}, {0x20, 0x9}, {0x7}, {0x6, 0x1d4}]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r5 = getpid() sched_getattr(r5, &(0x7f0000000200), 0x30, 0x0) r6 = syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x0, 0x40000) ioctl$KVM_SET_GSI_ROUTING(r6, 0x4008ae6a, &(0x7f0000000440)=ANY=[@ANYBLOB="050000000000000000100000030000000000000000000000070000000200000000000000000000000000000000000000000000000000000005b89e00050000000000000000000000000400000000008000000000000000000000000000000000000000000000000000000000070000000000000000000000020000000000000000080000000000000000e42c0000000001560a000004000000000000000000000007000000ff030000000000330000000000000000000000000000000000000000000100e75fc8bec5b682f62189c5dcfa5900050000000000000000000000ff7f000001000000030000000000000000000000000000000000000000000000a89a63a0123ff7cc58ba75423e9699be7a3e17fad950"]) 10:26:58 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, 0x0, &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:26:58 executing program 2: accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000003c0)=0x14) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x400000, 0x0) syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffff9c) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) getdents(0xffffffffffffffff, 0x0, 0xfffffffffffffd47) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x78, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, 0x0, 0x0) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r2, r1, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x3e3) write$binfmt_script(0xffffffffffffffff, 0x0, 0x2db) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 2984.910973][ C0] net_ratelimit: 21 callbacks suppressed [ 2984.910981][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2984.911009][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2984.916728][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2984.922558][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2984.939713][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2984.990981][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2984.996809][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2985.311042][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2985.316929][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2985.401032][ C0] protocol 88fb is buggy, dev hsr_slave_0 10:27:02 executing program 2: accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000003c0)=0x14) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x400000, 0x0) syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffff9c) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) getdents(0xffffffffffffffff, 0x0, 0xfffffffffffffd47) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x78, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, 0x0, 0x0) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r2, r1, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x3e3) write$binfmt_script(0xffffffffffffffff, 0x0, 0x2db) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 10:27:02 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, 0x0, &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:27:02 executing program 0: accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000003c0)=0x14) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x400000, 0x0) syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffff9c) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) getdents(0xffffffffffffffff, 0x0, 0xfffffffffffffd47) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x78, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, 0x0, 0x0) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r2, r1, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x3e3) write$binfmt_script(0xffffffffffffffff, 0x0, 0x2db) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 10:27:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') writev(0xffffffffffffffff, &(0x7f000000a300)=[{&(0x7f000000a3c0)='y', 0x1}], 0x1) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00', 0x800}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd0") ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x40, &(0x7f00001cb000/0x1000)=nil}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2990.030994][ C0] net_ratelimit: 28 callbacks suppressed [ 2990.031002][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2990.042557][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:27:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$IMCLEAR_L2(0xffffffffffffffff, 0x80044946, &(0x7f0000000080)=0x9e) setsockopt$inet6_dccp_int(r0, 0x21, 0x15, &(0x7f0000000040)=0x7f, 0x4) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000280)='trusted.overlay.origin\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000380)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000300)=@buf={0x1000, &(0x7f0000000580)="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"}) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec7) ioctl$KVM_NMI(r3, 0xae9a) r4 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$PIO_UNIMAP(r4, 0x4b67, &(0x7f0000000140)={0x4, &(0x7f00000000c0)=[{0x7, 0xfffffffffffffffa}, {0x20, 0x9}, {0x7}, {0x6, 0x1d4}]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r5 = getpid() sched_getattr(r5, &(0x7f0000000200), 0x30, 0x0) r6 = syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x0, 0x40000) ioctl$KVM_SET_GSI_ROUTING(r6, 0x4008ae6a, &(0x7f0000000440)=ANY=[@ANYBLOB="050000000000000000100000030000000000000000000000070000000200000000000000000000000000000000000000000000000000000005b89e00050000000000000000000000000400000000008000000000000000000000000000000000000000000000000000000000070000000000000000000000020000000000000000080000000000000000e42c0000000001560a000004000000000000000000000007000000ff030000000000330000000000000000000000000000000000000000000100e75fc8bec5b682f62189c5dcfa5900050000000000000000000000ff7f000001000000030000000000000000000000000000000000000000000000a89a63a0123ff7cc58ba75423e9699be7a3e17fad950"]) 10:27:05 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, 0x0, &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 2991.151004][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2991.151047][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2991.156808][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2991.168366][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2991.174171][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2991.230993][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2991.236979][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2991.551045][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2995.311022][ C1] net_ratelimit: 19 callbacks suppressed [ 2995.311031][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2995.311067][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2995.316947][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2995.334386][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2995.340180][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2995.390998][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2995.396816][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2995.711176][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2995.717007][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2995.791010][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3000.431016][ C0] net_ratelimit: 28 callbacks suppressed [ 3000.431026][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3000.442566][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3001.551005][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3001.551054][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3001.556813][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3001.568395][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3001.574265][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3001.630991][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3001.636827][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3001.950994][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3005.710976][ C1] net_ratelimit: 19 callbacks suppressed [ 3005.710985][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3005.711018][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3005.716711][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3005.734089][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3005.739857][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3005.790987][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3005.796823][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3006.111009][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3006.116825][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3006.191007][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3010.830963][ C0] net_ratelimit: 27 callbacks suppressed [ 3010.830972][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3010.842484][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3011.951018][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3011.951052][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3011.956855][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3011.962691][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3011.974134][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3012.030979][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3012.036799][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3012.351025][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3015.372063][T19055] device bridge_slave_1 left promiscuous mode [ 3015.378331][T19055] bridge0: port 2(bridge_slave_1) entered disabled state [ 3016.111009][ C1] net_ratelimit: 18 callbacks suppressed [ 3016.111017][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3016.111071][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3016.116747][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3016.134096][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3016.139886][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3016.190980][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3016.196800][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3016.511027][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3016.516845][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3016.590974][ C0] protocol 88fb is buggy, dev hsr_slave_0 10:27:33 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000001d40)=[{{&(0x7f0000001a00)=@llc={0x1a, 0x0, 0x20, 0x8, 0x7f8d, 0x5}, 0x80, &(0x7f0000001d00)=[{&(0x7f0000001c40)}], 0x1}, 0x7fffffff}], 0x1, 0x20004010) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\b\x00\x00\xf9\xff\x85nG\x13g\xa6\x05', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r1, r0, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) 10:27:33 executing program 0: accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000003c0)=0x14) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x400000, 0x0) syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffff9c) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) getdents(0xffffffffffffffff, 0x0, 0xfffffffffffffd47) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x78, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r2, r1, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x3e3) write$binfmt_script(0xffffffffffffffff, 0x0, 0x2db) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 10:27:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') writev(0xffffffffffffffff, &(0x7f000000a300)=[{&(0x7f000000a3c0)='y', 0x1}], 0x1) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00', 0x800}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd0") ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x40, &(0x7f00001cb000/0x1000)=nil}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:27:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') writev(0xffffffffffffffff, &(0x7f000000a300)=[{&(0x7f000000a3c0)='y', 0x1}], 0x1) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00', 0x800}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd0") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x40, &(0x7f00001cb000/0x1000)=nil}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, 0x0, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:27:33 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:27:33 executing program 2: accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000003c0)=0x14) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x400000, 0x0) syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffff9c) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) getdents(0xffffffffffffffff, 0x0, 0xfffffffffffffd47) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x78, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r2, r1, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x3e3) write$binfmt_script(0xffffffffffffffff, 0x0, 0x2db) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 10:27:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r1, &(0x7f0000009400)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) recvmsg(r1, &(0x7f0000002bc0)={0x0, 0x0, 0x0}, 0x0) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r1, 0x0) [ 3020.784766][T19055] device bridge_slave_0 left promiscuous mode [ 3020.801109][T19055] bridge0: port 1(bridge_slave_0) entered disabled state 10:27:36 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000000)='#wlan0selinuxppp1]\x00') [ 3021.240971][ C0] net_ratelimit: 27 callbacks suppressed [ 3021.240979][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3021.252592][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:27:36 executing program 0: accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000003c0)=0x14) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x400000, 0x0) syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffff9c) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) getdents(0xffffffffffffffff, 0x0, 0xfffffffffffffd47) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x78, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r2, r1, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x3e3) write$binfmt_script(0xffffffffffffffff, 0x0, 0x2db) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 10:27:37 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:27:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') writev(0xffffffffffffffff, &(0x7f000000a300)=[{&(0x7f000000a3c0)='y', 0x1}], 0x1) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00', 0x800}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd0") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x40, &(0x7f00001cb000/0x1000)=nil}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, 0x0, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 3022.350975][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3022.350994][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3022.356795][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3022.366328][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3022.430996][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3022.436820][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3022.751021][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3022.756888][ C1] protocol 88fb is buggy, dev hsr_slave_1 10:27:39 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r1 = socket(0x30002000000010, 0x3, 0x0) write(r1, &(0x7f0000000000)="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", 0xfc) 10:27:40 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:27:40 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000000)='#wlan0selinuxppp1]\x00') [ 3026.510988][ C0] net_ratelimit: 16 callbacks suppressed [ 3026.510996][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3026.511024][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3026.516738][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3026.590978][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3026.596798][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3026.910996][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3026.916826][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3026.990979][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3026.996810][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3027.470978][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3031.630983][ C0] net_ratelimit: 21 callbacks suppressed [ 3031.630992][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3031.642593][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:27:47 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000000)='#wlan0selinuxppp1]\x00') [ 3032.751016][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3032.751050][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3032.757648][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3032.830990][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3032.836829][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3033.151026][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3033.156851][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3033.230986][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3036.911027][ C0] net_ratelimit: 15 callbacks suppressed [ 3036.911036][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3036.911057][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3036.916772][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3036.990985][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3036.996814][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3037.311011][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3037.316828][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3037.391029][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3037.396863][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3037.870976][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3042.030987][ C0] net_ratelimit: 22 callbacks suppressed [ 3042.030996][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3042.042631][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3043.150986][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3043.151017][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3043.156808][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3043.230975][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3043.236793][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3043.551002][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3043.556819][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3043.621005][T19055] device hsr_slave_1 left promiscuous mode [ 3043.630988][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3047.310990][ C1] net_ratelimit: 14 callbacks suppressed [ 3047.311000][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3047.311033][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3047.316723][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3047.391014][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3047.396858][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3047.711014][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3047.716846][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3047.791008][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3047.796839][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3048.271008][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3050.857761][T19055] device hsr_slave_0 left promiscuous mode [ 3052.431009][ C0] net_ratelimit: 21 callbacks suppressed [ 3052.431018][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3052.442539][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3053.551009][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3053.551041][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3053.556821][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3053.630991][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3053.636806][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3053.951012][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3053.956828][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3054.030973][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3056.188984][T19055] team0 (unregistering): Port device team_slave_1 removed [ 3057.711000][ C0] net_ratelimit: 15 callbacks suppressed [ 3057.711008][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3057.711036][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3057.716764][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3057.790977][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3057.796809][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3058.111009][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3058.116821][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3058.190985][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3058.196811][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3058.412550][T19055] team0 (unregistering): Port device team_slave_0 removed [ 3058.670980][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3060.331132][T19055] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 3062.830992][ C0] net_ratelimit: 21 callbacks suppressed [ 3062.831001][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3062.842661][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3063.950987][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3063.951021][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3063.956944][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3064.030989][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3064.037369][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3064.351029][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3064.357378][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3064.431029][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3065.731042][T19055] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 3068.110975][ C0] net_ratelimit: 14 callbacks suppressed [ 3068.110983][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3068.111010][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3068.117158][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3068.190976][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3068.196888][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3068.511022][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3068.518116][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3068.590976][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3068.596923][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3069.070988][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3070.662864][T19055] bond0 (unregistering): Released all slaves [ 3073.230984][ C0] net_ratelimit: 21 callbacks suppressed [ 3073.230993][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3073.242508][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3074.351014][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3074.351045][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3074.356838][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3074.431008][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3074.436874][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3074.751006][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3074.757540][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3074.830964][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3078.511008][ C1] net_ratelimit: 15 callbacks suppressed [ 3078.511017][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3078.511022][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3078.511084][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3078.516741][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3078.590976][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3078.596796][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3078.911009][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3078.916847][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3078.990996][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3078.996851][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3083.630978][ C0] net_ratelimit: 24 callbacks suppressed [ 3083.630987][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3083.642640][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3084.750972][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3084.750979][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3084.751024][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3084.756803][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3084.830977][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3084.836790][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3085.150994][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3085.156830][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3086.269502][T29988] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 3088.910990][ C0] net_ratelimit: 15 callbacks suppressed [ 3088.910998][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3088.911026][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3088.916741][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3088.990976][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3088.996794][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3089.311012][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3089.316841][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3089.391010][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3089.396840][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3089.870982][ C0] protocol 88fb is buggy, dev hsr_slave_0 10:29:01 executing program 2: accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000003c0)=0x14) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x400000, 0x0) syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffff9c) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) getdents(0xffffffffffffffff, 0x0, 0xfffffffffffffd47) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x78, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r2, r1, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x3e3) write$binfmt_script(0xffffffffffffffff, 0x0, 0x2db) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 10:29:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') writev(0xffffffffffffffff, &(0x7f000000a300)=[{&(0x7f000000a3c0)='y', 0x1}], 0x1) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00', 0x800}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd0") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x40, &(0x7f00001cb000/0x1000)=nil}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, 0x0, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:29:01 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:29:01 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x5000008912, &(0x7f0000000140)="0adc1f123c123f319bd070") setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000002a00)=0x2, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e21}, 0x10) setsockopt$inet_int(r0, 0x0, 0x12, &(0x7f0000000000)=0x8e, 0x4) recvmmsg(r0, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20012001, 0x0) 10:29:01 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$selinux_attr(r1, &(0x7f00000003c0)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24) getresgid(0x0, &(0x7f0000000400), &(0x7f0000000440)) sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000000240)={&(0x7f0000000080), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x81) r2 = semget(0x3, 0x3, 0x8) semop(r2, &(0x7f0000000040)=[{0x7, 0x0, 0x1800}, {0x0, 0x0, 0x1800}, {0x2, 0x1, 0x800}], 0x3) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'mangle\x00'}, &(0x7f0000000200)=0x54) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000300)=[@in6={0xa, 0x4e24, 0x1f, @rand_addr="f208d2da5ab5039a611e57cffa48076b", 0x9}, @in={0x2, 0x4e22, @loopback}, @in={0x2, 0x4e23, @loopback}], 0x3c) 10:29:04 executing program 4: userfaultfd(0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001d40)=[{{&(0x7f0000001a00)=@llc={0x1a, 0x0, 0x0, 0x0, 0x7f8d, 0x5}, 0x80, 0x0}, 0x7fffffff}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\b\x00\x00\xf9\xff\x85nG\x13g\xa6\x05', 0x0) pwritev(r1, &(0x7f0000000340), 0x0, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r1, r0, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) 10:29:04 executing program 0: clone(0x202, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) r2 = dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff2, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x841, 0xfffffffffffffffe) write$P9_RWALK(r2, 0x0, 0x0) [ 3109.087048][T30080] IPVS: ftp: loaded support on port[0] = 21 [ 3109.435718][T30080] chnl_net:caif_netlink_parms(): no params data found [ 3109.638042][T30080] bridge0: port 1(bridge_slave_0) entered blocking state [ 3109.675685][T30080] bridge0: port 1(bridge_slave_0) entered disabled state [ 3109.693022][T30080] device bridge_slave_0 entered promiscuous mode [ 3109.731659][T30080] bridge0: port 2(bridge_slave_1) entered blocking state [ 3109.751001][T30080] bridge0: port 2(bridge_slave_1) entered disabled state [ 3109.759799][T30080] device bridge_slave_1 entered promiscuous mode 10:29:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGICOUNT(r1, 0x545d, 0x0) [ 3109.864169][T30080] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 3109.913073][T30080] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 3110.007626][T30088] IPVS: ftp: loaded support on port[0] = 21 [ 3110.015595][T30080] team0: Port device team_slave_0 added [ 3110.052152][T30080] team0: Port device team_slave_1 added 10:29:06 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:29:06 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46c00) io_setup(0x4, &(0x7f0000000100)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) [ 3111.633627][T30080] device hsr_slave_0 entered promiscuous mode 10:29:07 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 3112.751834][T30080] device hsr_slave_1 entered promiscuous mode 10:29:08 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(0x0) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 3114.559224][T30096] IPVS: ftp: loaded support on port[0] = 21 [ 3114.713707][T30080] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3114.774057][T30080] 8021q: adding VLAN 0 to HW filter on device team0 [ 3114.791298][T27289] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3114.799151][T27289] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3114.865578][T29657] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3114.881592][T29657] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3114.890191][T29657] bridge0: port 1(bridge_slave_0) entered blocking state [ 3114.897321][T29657] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3114.962857][T20322] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3114.978675][T20322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3115.018332][T20322] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3115.031472][T20322] bridge0: port 2(bridge_slave_1) entered blocking state [ 3115.038625][T20322] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3115.071641][T20322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3115.080508][T20322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3115.102108][T20322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3115.131850][T20322] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3115.156938][T30088] chnl_net:caif_netlink_parms(): no params data found [ 3115.177346][T30080] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3115.210975][T30080] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3115.223439][T29657] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3115.241927][T29657] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3115.250654][T29657] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3115.281681][T29657] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3115.290063][T29657] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3115.331875][T29657] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3115.340229][T29657] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3115.380639][T30080] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3115.450966][T27289] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3115.544525][T30088] bridge0: port 1(bridge_slave_0) entered blocking state [ 3115.583414][T30088] bridge0: port 1(bridge_slave_0) entered disabled state [ 3115.608824][T30088] device bridge_slave_0 entered promiscuous mode [ 3115.649597][T30096] chnl_net:caif_netlink_parms(): no params data found [ 3115.674560][T30088] bridge0: port 2(bridge_slave_1) entered blocking state [ 3115.686472][T30088] bridge0: port 2(bridge_slave_1) entered disabled state [ 3115.700492][T30088] device bridge_slave_1 entered promiscuous mode [ 3115.789949][T30088] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 3115.818034][T30088] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 3115.827635][T30096] bridge0: port 1(bridge_slave_0) entered blocking state [ 3115.835311][T30096] bridge0: port 1(bridge_slave_0) entered disabled state [ 3115.844081][T30096] device bridge_slave_0 entered promiscuous mode [ 3115.866724][T30096] bridge0: port 2(bridge_slave_1) entered blocking state [ 3115.875468][T30096] bridge0: port 2(bridge_slave_1) entered disabled state [ 3115.884118][T30096] device bridge_slave_1 entered promiscuous mode [ 3115.894423][T30088] team0: Port device team_slave_0 added [ 3115.902735][T30088] team0: Port device team_slave_1 added [ 3115.938688][T30096] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 3117.775665][T30088] device hsr_slave_0 entered promiscuous mode [ 3119.691494][T30088] device hsr_slave_1 entered promiscuous mode [ 3121.653019][T30096] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 3129.571975][T30096] team0: Port device team_slave_0 added [ 3129.595958][T30096] team0: Port device team_slave_1 added [ 3129.640366][T30088] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3131.810534][T29657] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3131.841671][T29657] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3133.893777][T30096] device hsr_slave_0 entered promiscuous mode [ 3135.841118][T30096] device hsr_slave_1 entered promiscuous mode [ 3137.950101][T30088] 8021q: adding VLAN 0 to HW filter on device team0 [ 3140.261252][T29657] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3140.270233][T29657] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3140.308163][T29657] bridge0: port 1(bridge_slave_0) entered blocking state [ 3140.315387][T29657] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3140.348107][T29657] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3140.381695][T29657] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3140.390188][T29657] bridge0: port 2(bridge_slave_1) entered blocking state [ 3140.397385][T29657] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3140.429889][T29657] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3140.451895][T29657] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3140.541387][T20322] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3140.549349][T20322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3140.570234][T20322] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3140.580292][T20322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3140.606740][T20322] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3140.648065][T20322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3140.660279][T20322] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3140.703030][T20322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3140.721588][T20322] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3140.753600][T30096] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3140.762359][T30088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3140.781102][T27289] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3140.862359][T20322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3140.870103][T20322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3140.890541][T30088] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3140.904413][T30096] 8021q: adding VLAN 0 to HW filter on device team0 [ 3140.930029][T20322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3140.958122][T20322] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3141.000705][T20322] bridge0: port 1(bridge_slave_0) entered blocking state [ 3141.007868][T20322] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3141.052389][T29657] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3141.070660][T29657] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3141.107399][T29657] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3141.134404][T29657] bridge0: port 2(bridge_slave_1) entered blocking state [ 3141.141569][T29657] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3141.159538][T29657] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3141.169664][T29657] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3141.186814][T29657] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3141.199956][T29657] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3141.238276][T30096] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3141.259776][T30096] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3141.323187][T20322] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3141.341757][T20322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3141.380240][T20322] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3141.409962][T20322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3141.432395][T20322] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3141.455340][T20322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3141.482451][T20322] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3145.767388][T30138] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 3145.821432][T30138] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 3148.591850][T30138] net_ratelimit: 13 callbacks suppressed [ 3148.591859][T30138] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 10:29:43 executing program 2: ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001d40)=[{{&(0x7f0000001a00)=@llc={0x1a, 0x0, 0x0, 0x8, 0x7f8d, 0x5}, 0x80, 0x0}, 0x7fffffff}], 0x1, 0x20004010) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\b\x00\x00\xf9\xff\x85nG\x13g\xa6\x05', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r1, r0, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) 10:29:43 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x12, 0x4000, 0x0, "ce8d03d3259cbe90d95a6db2f2b225468b08f39b9c747c6b3aca469644f27dd4241e7a4bc8ac1cb54cbac7346cc01c5c52a0f35df46e38798df77245c435a4ef", "3104ffa09dcb7e2600ca9438f103e043532f8a1c6dfa6ad8e61f764a487515ed", [0x2]}) 10:29:43 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(0x0) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:29:43 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, "ce8d03d3259cbe90d95a6db2f2b225468b08f39b9c747c6b3aca469644f27dd4241e7a4bc8ac1cb54cbac7346cc01c5c52a0f35df46e38798df77245c435a4ef", "3104ffa09dcb7e2600ca9438f103e043532f8a1c6dfa6ad8e61f764a487515ed"}) 10:29:43 executing program 5: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) chdir(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f00000004c0)='./file0\x00', 0x0) futimesat(r0, &(0x7f0000000080)='./file0/../file0\x00', 0x0) [ 3148.669955][T29657] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3148.684198][T30096] 8021q: adding VLAN 0 to HW filter on device batadv0 10:29:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)}], 0x0, 0x0) [ 3149.811468][T30165] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 3149.819337][T30165] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 3149.883893][T30165] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 3149.921000][T30165] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock 10:29:47 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(0x0) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:29:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x0, &(0x7f0000000180)=""/118, 0xffffffffffffff25) r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) unshare(0x40000000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) 10:29:47 executing program 3: userfaultfd(0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_proto_private(0xffffffffffffffff, 0x89e9, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\b\x00\x00\xf9\xff\x85nG\x13g\xa6\x05', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r1, r0, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) 10:29:47 executing program 4: prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:29:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') writev(0xffffffffffffffff, &(0x7f000000a300)=[{&(0x7f000000a3c0)='y', 0x1}], 0x1) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00', 0x800}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd0") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x40, &(0x7f00001cb000/0x1000)=nil}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, 0x0, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:29:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') writev(0xffffffffffffffff, &(0x7f000000a300)=[{&(0x7f000000a3c0)='y', 0x1}], 0x1) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00', 0x800}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd0") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x40, &(0x7f00001cb000/0x1000)=nil}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, 0x0, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:29:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') writev(0xffffffffffffffff, &(0x7f000000a300)=[{&(0x7f000000a3c0)='y', 0x1}], 0x1) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00', 0x800}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd0") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x40, &(0x7f00001cb000/0x1000)=nil}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 3152.406864][T30183] IPVS: ftp: loaded support on port[0] = 21 10:29:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') writev(0xffffffffffffffff, &(0x7f000000a300)=[{&(0x7f000000a3c0)='y', 0x1}], 0x1) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00', 0x800}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd0") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x40, &(0x7f00001cb000/0x1000)=nil}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, 0x0, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 3152.825130][T30194] IPVS: ftp: loaded support on port[0] = 21 10:29:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x0, &(0x7f0000000180)=""/118, 0xffffffffffffff25) r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) unshare(0x40000000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) [ 3153.085782][T30207] IPVS: ftp: loaded support on port[0] = 21 10:29:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') writev(0xffffffffffffffff, &(0x7f000000a300)=[{&(0x7f000000a3c0)='y', 0x1}], 0x1) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00', 0x800}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd0") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x40, &(0x7f00001cb000/0x1000)=nil}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:29:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') writev(0xffffffffffffffff, &(0x7f000000a300)=[{&(0x7f000000a3c0)='y', 0x1}], 0x1) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00', 0x800}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd0") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x40, &(0x7f00001cb000/0x1000)=nil}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, 0x0, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:29:48 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(0x0) 10:29:48 executing program 3: accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000003c0)=0x14) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x400000, 0x0) syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffff9c) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) getdents(0xffffffffffffffff, 0x0, 0xfffffffffffffd47) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r2, r1, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x3e3) write$binfmt_script(0xffffffffffffffff, 0x0, 0x2db) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 10:29:48 executing program 4: accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000003c0)=0x14) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x400000, 0x0) syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffff9c) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) getdents(0xffffffffffffffff, 0x0, 0xfffffffffffffd47) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r2, r1, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x3e3) write$binfmt_script(0xffffffffffffffff, 0x0, 0x2db) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 10:29:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x0, &(0x7f0000000180)=""/118, 0xffffffffffffff25) r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) unshare(0x40000000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) 10:29:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') writev(0xffffffffffffffff, &(0x7f000000a300)=[{&(0x7f000000a3c0)='y', 0x1}], 0x1) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00', 0x800}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd0") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x40, &(0x7f00001cb000/0x1000)=nil}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:29:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') writev(0xffffffffffffffff, &(0x7f000000a300)=[{&(0x7f000000a3c0)='y', 0x1}], 0x1) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00', 0x800}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd0") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x40, &(0x7f00001cb000/0x1000)=nil}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, 0x0, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 3154.118331][T30230] IPVS: ftp: loaded support on port[0] = 21 10:29:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') writev(0xffffffffffffffff, &(0x7f000000a300)=[{&(0x7f000000a3c0)='y', 0x1}], 0x1) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00', 0x800}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd0") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x40, &(0x7f00001cb000/0x1000)=nil}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, 0x0, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:29:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') writev(0xffffffffffffffff, &(0x7f000000a300)=[{&(0x7f000000a3c0)='y', 0x1}], 0x1) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00', 0x800}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd0") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x40, &(0x7f00001cb000/0x1000)=nil}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:29:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') writev(0xffffffffffffffff, &(0x7f000000a300)=[{&(0x7f000000a3c0)='y', 0x1}], 0x1) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00', 0x800}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd0") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x40, &(0x7f00001cb000/0x1000)=nil}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, 0x0, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:29:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') writev(0xffffffffffffffff, &(0x7f000000a300)=[{&(0x7f000000a3c0)='y', 0x1}], 0x1) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00', 0x800}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd0") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x40, &(0x7f00001cb000/0x1000)=nil}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:29:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') writev(0xffffffffffffffff, &(0x7f000000a300)=[{&(0x7f000000a3c0)='y', 0x1}], 0x1) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00', 0x800}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd0") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x40, &(0x7f00001cb000/0x1000)=nil}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:29:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') writev(0xffffffffffffffff, &(0x7f000000a300)=[{&(0x7f000000a3c0)='y', 0x1}], 0x1) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00', 0x800}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd0") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x40, &(0x7f00001cb000/0x1000)=nil}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:29:53 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(0x0) 10:29:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') writev(0xffffffffffffffff, &(0x7f000000a300)=[{&(0x7f000000a3c0)='y', 0x1}], 0x1) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00', 0x800}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd0") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x40, &(0x7f00001cb000/0x1000)=nil}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:29:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') writev(0xffffffffffffffff, &(0x7f000000a300)=[{&(0x7f000000a3c0)='y', 0x1}], 0x1) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00', 0x800}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd0") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x40, &(0x7f00001cb000/0x1000)=nil}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:30:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x0, &(0x7f0000000180)=""/118, 0xffffffffffffff25) r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) unshare(0x40000000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) 10:30:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') writev(0xffffffffffffffff, &(0x7f000000a300)=[{&(0x7f000000a3c0)='y', 0x1}], 0x1) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00', 0x800}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd0") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x40, &(0x7f00001cb000/0x1000)=nil}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:30:29 executing program 3: accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000003c0)=0x14) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x400000, 0x0) syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffff9c) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) getdents(0xffffffffffffffff, 0x0, 0xfffffffffffffd47) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r2, r1, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x3e3) write$binfmt_script(0xffffffffffffffff, 0x0, 0x2db) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 10:30:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') writev(0xffffffffffffffff, &(0x7f000000a300)=[{&(0x7f000000a3c0)='y', 0x1}], 0x1) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00', 0x800}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd0") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x40, &(0x7f00001cb000/0x1000)=nil}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, 0x0, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:30:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') writev(0xffffffffffffffff, &(0x7f000000a300)=[{&(0x7f000000a3c0)='y', 0x1}], 0x1) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00', 0x800}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd0") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x40, &(0x7f00001cb000/0x1000)=nil}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:30:29 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(0x0) [ 3194.783649][T30291] IPVS: ftp: loaded support on port[0] = 21 10:30:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') writev(0xffffffffffffffff, &(0x7f000000a300)=[{&(0x7f000000a3c0)='y', 0x1}], 0x1) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00', 0x800}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd0") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x40, &(0x7f00001cb000/0x1000)=nil}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, 0x0, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:30:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') writev(0xffffffffffffffff, &(0x7f000000a300)=[{&(0x7f000000a3c0)='y', 0x1}], 0x1) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00', 0x800}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd0") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x40, &(0x7f00001cb000/0x1000)=nil}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, 0x0, 0x502, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x25090e6b, 0xda3, 0x80, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:30:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') writev(0xffffffffffffffff, &(0x7f000000a300)=[{&(0x7f000000a3c0)='y', 0x1}], 0x1) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00', 0x800}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd0") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x40, &(0x7f00001cb000/0x1000)=nil}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:30:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') writev(0xffffffffffffffff, &(0x7f000000a300)=[{&(0x7f000000a3c0)='y', 0x1}], 0x1) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00', 0x800}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd0") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x40, &(0x7f00001cb000/0x1000)=nil}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:30:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') writev(0xffffffffffffffff, &(0x7f000000a300)=[{&(0x7f000000a3c0)='y', 0x1}], 0x1) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00', 0x800}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd0") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x40, &(0x7f00001cb000/0x1000)=nil}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") 10:30:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') writev(0xffffffffffffffff, &(0x7f000000a300)=[{&(0x7f000000a3c0)='y', 0x1}], 0x1) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'nlmon0\x00', 0x800}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd0") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x40, &(0x7f00001cb000/0x1000)=nil}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_UNLOCK(0x0, 0xc) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) mknod(&(0x7f0000000080)='./file0\x00', 0x80, 0xc56) syz_execute_func(&(0x7f0000000100)="98460f72d4000f05c442fd31d3c4a37bf0c53e14d541e2e99fc4c1c162c112e296fbf39b0fc4014e66f66d220fa0e509ab34d1c4e10b0cdfc440a2b0d5be165e1d22ebf4a5b712650d0f6123d8894f0c0fddb2c95787fc3766450fe3900e00000000011d1dac26f20f38f0b4b60e000000c4660f7cafb11e00001166a79c6060545457f0b00bc483894837008d00f2f244c3c4c25d9dce826eae72f442dae966410f3a1754bf0099c42ec492df125b26264788fe58c4a1dd7dbbbfdd5cc6c4631540c4da7dc1c422e93c15e2b10400ae666744d8960000010030a1c9d6110ff8c11dc4a2b1e264") [ 3201.601691][T19055] IPVS: stopping master sync thread 9141 ... [ 3201.632859][T19055] device bridge_slave_1 left promiscuous mode [ 3201.639131][T19055] bridge0: port 2(bridge_slave_1) entered disabled state [ 3207.051426][T19055] device bridge_slave_0 left promiscuous mode [ 3207.057808][T19055] bridge0: port 1(bridge_slave_0) entered disabled state [ 3212.102677][T19055] device bridge_slave_1 left promiscuous mode [ 3212.108905][T19055] bridge0: port 2(bridge_slave_1) entered disabled state [ 3216.111346][T19055] device bridge_slave_0 left promiscuous mode [ 3216.117604][T19055] bridge0: port 1(bridge_slave_0) entered disabled state [ 3219.922199][T19055] device bridge_slave_1 left promiscuous mode [ 3219.928426][T19055] bridge0: port 2(bridge_slave_1) entered disabled state [ 3224.061382][T19055] device bridge_slave_0 left promiscuous mode [ 3224.067640][T19055] bridge0: port 1(bridge_slave_0) entered disabled state [ 3282.501897][T19055] device hsr_slave_1 left promiscuous mode [ 3287.121098][T19055] device hsr_slave_0 left promiscuous mode [ 3291.651704][T19055] team0 (unregistering): Port device team_slave_1 removed [ 3293.191725][T19055] team0 (unregistering): Port device team_slave_0 removed [ 3295.121800][T19055] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 3300.331031][T19055] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 3303.265983][T19055] bond0 (unregistering): Released all slaves [ 3324.561016][T19055] device hsr_slave_1 left promiscuous mode [ 3328.781055][T19055] device hsr_slave_0 left promiscuous mode [ 3333.301763][T19055] team0 (unregistering): Port device team_slave_1 removed [ 3334.631724][T19055] team0 (unregistering): Port device team_slave_0 removed [ 3336.537628][T19055] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 3343.241083][T19055] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 3345.818639][T19055] bond0 (unregistering): Released all slaves [ 3351.551127][ T1041] INFO: task kworker/0:0:20322 blocked for more than 143 seconds. [ 3351.558984][ T1041] Not tainted 5.1.0-rc7+ #96 [ 3351.611085][ T1041] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 3351.619811][ T1041] kworker/0:0 D26416 20322 2 0x80000000 [ 3351.660939][ T1041] Workqueue: events switchdev_deferred_process_work [ 3351.670359][ T1041] Call Trace: [ 3351.730985][ T1041] __schedule+0x813/0x1cc0 [ 3351.735480][ T1041] ? __mutex_lock+0x721/0x1310 [ 3351.740268][ T1041] ? __sched_text_start+0x8/0x8 [ 3351.780952][ T1041] schedule+0x92/0x180 [ 3351.785293][ T1041] schedule_preempt_disabled+0x13/0x20 [ 3351.790769][ T1041] __mutex_lock+0x726/0x1310 [ 3351.850993][ T1041] ? rtnl_lock+0x17/0x20 [ 3351.855304][ T1041] ? mutex_trylock+0x1e0/0x1e0 [ 3351.860084][ T1041] ? mark_held_locks+0xf0/0xf0 [ 3351.900952][ T1041] ? process_one_work+0x890/0x1790 [ 3351.906159][ T1041] mutex_lock_nested+0x16/0x20 [ 3351.952020][ T1041] ? mutex_lock_nested+0x16/0x20 [ 3351.957018][ T1041] rtnl_lock+0x17/0x20 [ 3351.991007][ T1041] switchdev_deferred_process_work+0xe/0x20 [ 3351.996964][ T1041] process_one_work+0x98e/0x1790 [ 3352.031018][ T1041] ? pwq_dec_nr_in_flight+0x320/0x320 [ 3352.036445][ T1041] ? lock_acquire+0x16f/0x3f0 [ 3352.100944][ T1041] worker_thread+0x98/0xe40 [ 3352.105523][ T1041] ? trace_hardirqs_on+0x67/0x230 [ 3352.110570][ T1041] kthread+0x357/0x430 [ 3352.150988][ T1041] ? process_one_work+0x1790/0x1790 [ 3352.156255][ T1041] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 3352.191051][ T1041] ret_from_fork+0x3a/0x50 [ 3352.195630][ T1041] INFO: task kworker/0:3:27289 blocked for more than 144 seconds. [ 3352.240927][ T1041] Not tainted 5.1.0-rc7+ #96 [ 3352.246358][ T1041] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 3352.300914][ T1041] kworker/0:3 D26656 27289 2 0x80000000 [ 3352.307324][ T1041] Workqueue: events linkwatch_event [ 3352.370952][ T1041] Call Trace: [ 3352.374306][ T1041] __schedule+0x813/0x1cc0 [ 3352.378728][ T1041] ? __mutex_lock+0x721/0x1310 [ 3352.410982][ T1041] ? __sched_text_start+0x8/0x8 [ 3352.415886][ T1041] schedule+0x92/0x180 [ 3352.419968][ T1041] schedule_preempt_disabled+0x13/0x20 [ 3352.480935][ T1041] __mutex_lock+0x726/0x1310 [ 3352.485588][ T1041] ? rtnl_lock+0x17/0x20 [ 3352.489877][ T1041] ? mutex_trylock+0x1e0/0x1e0 [ 3352.540931][ T1041] ? mark_held_locks+0xf0/0xf0 [ 3352.545751][ T1041] ? process_one_work+0x890/0x1790 [ 3352.591031][ T1041] mutex_lock_nested+0x16/0x20 [ 3352.595845][ T1041] ? mutex_lock_nested+0x16/0x20 [ 3352.600790][ T1041] rtnl_lock+0x17/0x20 [ 3352.640927][ T1041] linkwatch_event+0xf/0x70 [ 3352.645488][ T1041] process_one_work+0x98e/0x1790 [ 3352.650671][ T1041] ? pwq_dec_nr_in_flight+0x320/0x320 [ 3352.690975][ T1041] ? lock_acquire+0x16f/0x3f0 [ 3352.695717][ T1041] worker_thread+0x98/0xe40 [ 3352.700224][ T1041] ? trace_hardirqs_on+0x67/0x230 [ 3352.740954][ T1041] kthread+0x357/0x430 [ 3352.745096][ T1041] ? process_one_work+0x1790/0x1790 [ 3352.750302][ T1041] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 3352.810986][ T1041] ret_from_fork+0x3a/0x50 [ 3352.815515][ T1041] INFO: task syz-executor.2:30291 blocked for more than 144 seconds. [ 3352.840918][ T1041] Not tainted 5.1.0-rc7+ #96 [ 3352.846074][ T1041] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 3352.890968][ T1041] syz-executor.2 D28352 30291 30088 0x80000004 [ 3352.897356][ T1041] Call Trace: [ 3352.900660][ T1041] __schedule+0x813/0x1cc0 [ 3352.931001][ T1041] ? __mutex_lock+0x721/0x1310 [ 3352.935829][ T1041] ? __sched_text_start+0x8/0x8 [ 3352.940792][ T1041] schedule+0x92/0x180 [ 3353.000947][ T1041] schedule_preempt_disabled+0x13/0x20 [ 3353.006463][ T1041] __mutex_lock+0x726/0x1310 [ 3353.031001][ T1041] ? rtnl_lock+0x17/0x20 [ 3353.035299][ T1041] ? mutex_trylock+0x1e0/0x1e0 [ 3353.040068][ T1041] ? kfree+0x173/0x230 [ 3353.071123][ T1041] ? cache_destroy_net+0x3c/0x50 [ 3353.076119][ T1041] ? kfree+0x173/0x230 [ 3353.080211][ T1041] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3353.121776][ T1041] ? trace_hardirqs_on+0x67/0x230 [ 3353.126882][ T1041] ? cache_destroy_net+0x3c/0x50 [ 3353.160940][ T1041] mutex_lock_nested+0x16/0x20 [ 3353.165770][ T1041] ? mutex_lock_nested+0x16/0x20 [ 3353.170719][ T1041] rtnl_lock+0x17/0x20 [ 3353.210996][ T1041] cangw_pernet_exit+0x13/0x30 [ 3353.215922][ T1041] ? cgw_remove_all_jobs+0x410/0x410 [ 3353.251807][ T1041] ops_exit_list.isra.0+0xb0/0x160 [ 3353.256980][ T1041] setup_net+0x400/0x740 [ 3353.280947][ T1041] ? ops_init+0x410/0x410 [ 3353.285349][ T1041] copy_net_ns+0x1df/0x340 [ 3353.289818][ T1041] create_new_namespaces+0x400/0x7b0 [ 3353.331016][ T1041] unshare_nsproxy_namespaces+0xc2/0x200 [ 3353.336737][ T1041] ksys_unshare+0x440/0x980 [ 3353.370987][ T1041] ? walk_process_tree+0x2d0/0x2d0 [ 3353.376153][ T1041] ? retint_kernel+0x2d/0x2d [ 3353.380791][ T1041] ? ksys_unshare+0x980/0x980 [ 3353.400939][ T1041] __x64_sys_unshare+0x31/0x40 [ 3353.405763][ T1041] do_syscall_64+0x103/0x610 [ 3353.410369][ T1041] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3353.460922][ T1041] RIP: 0033:0x458da9 [ 3353.464879][ T1041] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3353.540972][ T1041] RSP: 002b:00007fb67e0cfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 3353.549443][ T1041] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000458da9 [ 3353.590923][ T1041] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 3353.598946][ T1041] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3353.630929][ T1041] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb67e0d06d4 [ 3353.638963][ T1041] R13: 00000000004c7e4c R14: 00000000004de0c0 R15: 00000000ffffffff [ 3353.700993][ T1041] [ 3353.700993][ T1041] Showing all locks held in the system: [ 3353.708767][ T1041] 1 lock held by khungtaskd/1041: [ 3353.730932][ T1041] #0: 0000000076c033e5 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x27e [ 3353.740331][ T1041] 2 locks held by kworker/u4:3/2484: [ 3353.781005][ T1041] 1 lock held by rsyslogd/7719: [ 3353.785896][ T1041] #0: 00000000dc876c97 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 [ 3353.820991][ T1041] 2 locks held by getty/7831: [ 3353.825709][ T1041] #0: 000000004a04e2ec (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 3353.880975][ T1041] #1: 000000000db6a7aa (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 3353.890701][ T1041] 2 locks held by getty/7832: [ 3353.910927][ T1041] #0: 000000006830dcb7 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 3353.919973][ T1041] #1: 000000008e31052f (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 3353.981038][ T1041] 2 locks held by getty/7833: [ 3353.985800][ T1041] #0: 000000004b583cd3 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 3354.000965][ T1041] #1: 000000004ca5ca03 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 3354.010561][ T1041] 2 locks held by getty/7834: [ 3354.050928][ T1041] #0: 000000000d8d1579 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 3354.059946][ T1041] #1: 00000000083d8943 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 3354.110934][ T1041] 2 locks held by getty/7835: [ 3354.115659][ T1041] #0: 000000003e313123 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 3354.161826][ T1041] #1: 00000000106f4868 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 3354.190920][ T1041] 2 locks held by getty/7836: [ 3354.195630][ T1041] #0: 000000008ad023f3 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 3354.240966][ T1041] #1: 000000008950f790 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 3354.250603][ T1041] 2 locks held by getty/7837: [ 3354.280947][ T1041] #0: 000000005e3706d8 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 3354.289951][ T1041] #1: 00000000f7ef5599 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 3354.360994][ T1041] 2 locks held by syz-executor.4/31144: [ 3354.366580][ T1041] #0: 0000000030485c0f (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 3354.390905][ T1041] #1: 000000007c4b87a8 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 3354.400512][ T1041] 3 locks held by kworker/1:2/32443: [ 3354.440966][ T1041] #0: 0000000009b9b8a8 ((wq_completion)ipv6_addrconf){+.+.}, at: process_one_work+0x87e/0x1790 [ 3354.480911][ T1041] #1: 00000000fd33f43b ((addr_chk_work).work){+.+.}, at: process_one_work+0x8b4/0x1790 [ 3354.490704][ T1041] #2: 000000000ab4972b (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 3354.551792][ T1041] 1 lock held by syz-executor.4/16074: [ 3354.557302][ T1041] 1 lock held by syz-executor.4/17101: [ 3354.580927][ T1041] 1 lock held by syz-executor.4/17517: [ 3354.586438][ T1041] 1 lock held by syz-executor.4/18965: [ 3354.610974][ T1041] 4 locks held by kworker/u4:6/19055: [ 3354.616372][ T1041] #0: 00000000d8dd3df9 ((wq_completion)netns){+.+.}, at: process_one_work+0x87e/0x1790 [ 3354.681744][ T1041] #1: 000000008b5a4316 (net_cleanup_work){+.+.}, at: process_one_work+0x8b4/0x1790 [ 3354.700924][ T1041] #2: 000000005358f9c7 (pernet_ops_rwsem){++++}, at: cleanup_net+0xae/0x960 [ 3354.709767][ T1041] #3: 000000000ab4972b (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 3354.760953][ T1041] 3 locks held by kworker/0:0/20322: [ 3354.769232][ T1041] #0: 0000000027823f7b ((wq_completion)events){+.+.}, at: process_one_work+0x87e/0x1790 [ 3354.820909][ T1041] #1: 000000001e457b14 (deferred_process_work){+.+.}, at: process_one_work+0x8b4/0x1790 [ 3354.830786][ T1041] #2: 000000000ab4972b (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 3354.871085][T19055] kobject: 'rx-0' (00000000ad6e29ec): kobject_cleanup, parent 000000008740b3b2 [ 3354.880062][T19055] kobject: 'rx-0' (00000000ad6e29ec): auto cleanup 'remove' event [ 3354.890933][ T1041] 1 lock held by syz-executor.3/20833: [ 3354.896411][ T1041] 1 lock held by syz-executor.3/20856: [ 3354.930917][T19055] kobject: 'rx-0' (00000000ad6e29ec): kobject_uevent_env [ 3354.937992][T19055] kobject: 'rx-0' (00000000ad6e29ec): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3354.950078][ T1041] 1 lock held by syz-executor.3/20913: [ 3354.970916][ T1041] 1 lock held by syz-executor.3/21244: [ 3354.976490][ T1041] 1 lock held by syz-executor.3/21281: [ 3355.010917][T19055] kobject: 'rx-0' (00000000ad6e29ec): auto cleanup kobject_del [ 3355.018545][T19055] kobject: 'rx-0' (00000000ad6e29ec): calling ktype release [ 3355.026451][ T1041] 1 lock held by syz-executor.3/21578: [ 3355.050931][ T1041] 1 lock held by syz-executor.3/21702: [ 3355.056435][ T1041] 1 lock held by syz-executor.3/21790: [ 3355.071749][T19055] kobject: 'rx-0': free name [ 3355.076518][T19055] kobject: 'tx-0' (00000000d7ca3886): kobject_cleanup, parent 000000008740b3b2 [ 3355.085932][ T1041] 1 lock held by syz-executor.3/21933: [ 3355.110924][ T1041] 1 lock held by syz-executor.4/22753: [ 3355.117287][ T1041] 1 lock held by syz-executor.3/23168: [ 3355.130913][T19055] kobject: 'tx-0' (00000000d7ca3886): auto cleanup 'remove' event [ 3355.138737][T19055] kobject: 'tx-0' (00000000d7ca3886): kobject_uevent_env [ 3355.150979][ T1041] 1 lock held by syz-executor.1/23357: [ 3355.156449][ T1041] 1 lock held by syz-executor.1/23432: [ 3355.180990][T19055] kobject: 'tx-0' (00000000d7ca3886): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3355.210926][ T1041] 1 lock held by syz-executor.1/23651: [ 3355.216432][ T1041] 1 lock held by syz-executor.1/23872: [ 3355.230916][T19055] kobject: 'tx-0' (00000000d7ca3886): auto cleanup kobject_del [ 3355.238539][T19055] kobject: 'tx-0' (00000000d7ca3886): calling ktype release [ 3355.250917][ T1041] 1 lock held by syz-executor.1/24194: [ 3355.256396][ T1041] 1 lock held by syz-executor.1/24650: [ 3355.281001][ T1041] 1 lock held by syz-executor.3/25642: [ 3355.286486][ T1041] 1 lock held by syz-executor.1/25846: [ 3355.311014][T19055] kobject: 'tx-0': free name [ 3355.315669][T19055] kobject: 'queues' (000000008740b3b2): kobject_cleanup, parent (null) [ 3355.340966][ T1041] 1 lock held by syz-executor.1/26863: [ 3355.346459][ T1041] 3 locks held by kworker/0:3/27289: [ 3355.352204][T19055] kobject: 'queues' (000000008740b3b2): calling ktype release [ 3355.359676][T19055] kobject: 'queues' (000000008740b3b2): kset_release [ 3355.391900][ T1041] #0: 0000000027823f7b ((wq_completion)events){+.+.}, at: process_one_work+0x87e/0x1790 [ 3355.402272][T19055] kobject: 'queues': free name [ 3355.407647][T19055] kobject: 'bridge0' (00000000e4095f7e): kobject_uevent_env [ 3355.415530][ T1041] #1: 000000005999e7ee ((linkwatch_work).work){+.+.}, at: process_one_work+0x8b4/0x1790 [ 3355.450909][ T1041] #2: 000000000ab4972b (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 3355.458972][ T1041] 1 lock held by syz-executor.1/27410: [ 3355.465769][T19055] kobject: 'bridge0' (00000000e4095f7e): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3355.503071][T19055] kobject: 'rx-0' (00000000da43b19a): kobject_cleanup, parent 00000000b0f49d94 [ 3355.514829][ T1041] 1 lock held by syz-executor.3/27893: [ 3355.520300][ T1041] 1 lock held by syz-executor.1/28602: [ 3355.540946][ T1041] 1 lock held by syz-executor.4/28888: [ 3355.546432][ T1041] 1 lock held by syz-executor.1/29908: [ 3355.552288][T19055] kobject: 'rx-0' (00000000da43b19a): auto cleanup 'remove' event [ 3355.560102][T19055] kobject: 'rx-0' (00000000da43b19a): kobject_uevent_env [ 3355.600977][ T1041] 2 locks held by syz-executor.2/30291: [ 3355.606556][ T1041] #0: 000000005358f9c7 (pernet_ops_rwsem){++++}, at: copy_net_ns+0x1c0/0x340 [ 3355.620972][T19055] kobject: 'rx-0' (00000000da43b19a): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3355.640955][ T1041] #1: 000000000ab4972b (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 3355.650468][ T1041] [ 3355.660956][T19055] kobject: 'rx-0' (00000000da43b19a): auto cleanup kobject_del [ 3355.668552][T19055] kobject: 'rx-0' (00000000da43b19a): calling ktype release [ 3355.700956][ T1041] ============================================= [ 3355.700956][ T1041] [ 3355.709414][ T1041] NMI backtrace for cpu 0 [ 3355.713816][ T1041] CPU: 0 PID: 1041 Comm: khungtaskd Not tainted 5.1.0-rc7+ #96 [ 3355.721360][ T1041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3355.731415][ T1041] Call Trace: [ 3355.734718][ T1041] dump_stack+0x172/0x1f0 [ 3355.739055][ T1041] nmi_cpu_backtrace.cold+0x63/0xa4 [ 3355.744350][ T1041] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 3355.749997][ T1041] nmi_trigger_cpumask_backtrace+0x1be/0x236 [ 3355.756392][ T1041] arch_trigger_cpumask_backtrace+0x14/0x20 [ 3355.762292][ T1041] watchdog+0x9b7/0xec0 [ 3355.766457][ T1041] kthread+0x357/0x430 [ 3355.771225][ T1041] ? reset_hung_task_detector+0x30/0x30 [ 3355.776776][ T1041] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 3355.783020][ T1041] ret_from_fork+0x3a/0x50 [ 3355.787551][ T1041] Sending NMI from CPU 0 to CPUs 1: [ 3355.793417][ C1] NMI backtrace for cpu 1 [ 3355.793424][ C1] CPU: 1 PID: 23760 Comm: syz-executor.3 Not tainted 5.1.0-rc7+ #96 [ 3355.793430][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3355.793435][ C1] RIP: 0010:unwind_next_frame.part.0+0x118/0xa20 [ 3355.793446][ C1] Code: c1 ea 03 80 3c 02 00 0f 85 7c 05 00 00 48 b8 00 00 00 00 00 fc ff df 48 8b 53 28 48 8d 7a 18 48 89 fe 48 c1 ee 03 80 3c 06 00 <0f> 85 13 05 00 00 48 8b 42 18 48 8d b8 48 7f 00 00 4c 8d b8 58 7f [ 3355.793450][ C1] RSP: 0018:ffff88805eb8f9b0 EFLAGS: 00000046 [ 3355.793467][ C1] RAX: dffffc0000000000 RBX: ffff88805eb8fa88 RCX: ffff88805eb8fa38 [ 3355.793473][ C1] RDX: ffff88808af84500 RSI: 1ffff110115f08a3 RDI: ffff88808af84518 [ 3355.793478][ C1] RBP: ffff88805eb8fa60 R08: 0000000000000001 R09: ffff88805eb8fae0 [ 3355.793484][ C1] R10: ffff88805eb8fab0 R11: ffff88805eb8fac0 R12: 1ffff1100bd71f3b [ 3355.793489][ C1] R13: 0000000000000000 R14: ffff88805eb8fb20 R15: 0000000000000000 [ 3355.793495][ C1] FS: 00007f286e3d5700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 3355.793500][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3355.793505][ C1] CR2: ffffffffff600400 CR3: 0000000086ce0000 CR4: 00000000001406e0 [ 3355.793508][ C1] Call Trace: [ 3355.793512][ C1] ? unwind_dump+0x100/0x100 [ 3355.793515][ C1] ? unwind_dump+0x100/0x100 [ 3355.793519][ C1] unwind_next_frame+0x3b/0x50 [ 3355.793523][ C1] __save_stack_trace+0x83/0x100 [ 3355.793526][ C1] ? save_stack+0x45/0xd0 [ 3355.793530][ C1] save_stack_trace+0x1a/0x20 [ 3355.793533][ C1] save_stack+0x45/0xd0 [ 3355.793536][ C1] ? save_stack+0x45/0xd0 [ 3355.793540][ C1] ? kasan_check_write+0x14/0x20 [ 3355.793544][ C1] ? debug_check_no_obj_freed+0x200/0x464 [ 3355.793548][ C1] ? find_held_lock+0x35/0x130 [ 3355.793552][ C1] ? debug_check_no_obj_freed+0x200/0x464 [ 3355.793556][ C1] ? kasan_check_write+0x14/0x20 [ 3355.793560][ C1] ? lock_downgrade+0x880/0x880 [ 3355.793564][ C1] ? trace_hardirqs_off+0x62/0x220 [ 3355.793568][ C1] ? kasan_check_read+0x11/0x20 [ 3355.793572][ C1] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 3355.793576][ C1] ? debug_check_no_obj_freed+0x200/0x464 [ 3355.793580][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3355.793585][ C1] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3355.793588][ C1] ? __phys_addr+0xa4/0x120 [ 3355.793592][ C1] ? inotify_free_event+0x16/0x20 [ 3355.793596][ C1] __kasan_slab_free+0x102/0x150 [ 3355.793600][ C1] ? inotify_free_event+0x16/0x20 [ 3355.793603][ C1] kasan_slab_free+0xe/0x10 [ 3355.793607][ C1] kfree+0xcf/0x230 [ 3355.793610][ C1] inotify_free_event+0x16/0x20 [ 3355.793614][ C1] fsnotify_destroy_group+0x1d4/0x330 [ 3355.793618][ C1] ? fsnotify_put_group+0x390/0x390 [ 3355.793622][ C1] ? retire_userns_sysctls+0x90/0x90 [ 3355.793626][ C1] ? lockdep_init_map+0x1be/0x6d0 [ 3355.793629][ C1] do_inotify_init+0x53b/0x640 [ 3355.793633][ C1] ? trace_hardirqs_on+0x67/0x230 [ 3355.793637][ C1] __ia32_sys_inotify_init+0x10/0x20 [ 3355.793641][ C1] do_syscall_64+0x103/0x610 [ 3355.793645][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3355.793648][ C1] RIP: 0033:0x20000108 [ 3355.793660][ C1] Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 98 46 0f 72 d4 00 0f 05 42 fd 31 d3 c4 a3 7b f0 c5 3e 14 d5 41 e2 e9 9f c4 c1 c1 62 c1 [ 3355.793664][ C1] RSP: 002b:00007f286e3d4bd8 EFLAGS: 00000282 ORIG_RAX: 00000000000000fd [ 3355.793673][ C1] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 0000000020000108 [ 3355.793678][ C1] RDX: 36796cf0feb46045 RSI: 0000000000000000 RDI: 00007f286e3d5608 [ 3355.793684][ C1] RBP: 000000000000000a R08: 0000000000000005 R09: 0000000000000006 [ 3355.793689][ C1] R10: 0000000000000007 R11: 0000000000000282 R12: 000000000000000b [ 3355.793694][ C1] R13: 000000000000000c R14: 000000000000000d R15: 00000000ffffffff [ 3355.800904][T19055] kobject: 'rx-0': free name [ 3356.280918][ T1041] Kernel panic - not syncing: hung_task: blocked tasks [ 3356.287819][ T1041] CPU: 0 PID: 1041 Comm: khungtaskd Not tainted 5.1.0-rc7+ #96 [ 3356.295357][ T1041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3356.305408][ T1041] Call Trace: [ 3356.308711][ T1041] dump_stack+0x172/0x1f0 [ 3356.313055][ T1041] panic+0x2cb/0x65c [ 3356.316952][ T1041] ? __warn_printk+0xf3/0xf3 [ 3356.321551][ T1041] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 3356.327200][ T1041] ? ___preempt_schedule+0x16/0x18 [ 3356.332321][ T1041] ? nmi_trigger_cpumask_backtrace+0x19e/0x236 [ 3356.338479][ T1041] ? nmi_trigger_cpumask_backtrace+0x1fa/0x236 [ 3356.344635][ T1041] ? nmi_trigger_cpumask_backtrace+0x204/0x236 [ 3356.350790][ T1041] ? nmi_trigger_cpumask_backtrace+0x19e/0x236 [ 3356.356965][ T1041] watchdog+0x9c8/0xec0 [ 3356.361149][ T1041] kthread+0x357/0x430 [ 3356.365223][ T1041] ? reset_hung_task_detector+0x30/0x30 [ 3356.370771][ T1041] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 3356.377018][ T1041] ret_from_fork+0x3a/0x50 [ 3356.382494][ T1041] Kernel Offset: disabled [ 3356.386819][ T1041] Rebooting in 86400 seconds..