[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.25' (ECDSA) to the list of known hosts. 2020/03/29 07:16:46 fuzzer started 2020/03/29 07:16:48 dialing manager at 10.128.0.26:40803 2020/03/29 07:16:48 syscalls: 3028 2020/03/29 07:16:48 code coverage: enabled 2020/03/29 07:16:48 comparison tracing: enabled 2020/03/29 07:16:48 extra coverage: enabled 2020/03/29 07:16:48 setuid sandbox: enabled 2020/03/29 07:16:48 namespace sandbox: enabled 2020/03/29 07:16:48 Android sandbox: /sys/fs/selinux/policy does not exist 2020/03/29 07:16:48 fault injection: enabled 2020/03/29 07:16:48 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/03/29 07:16:48 net packet injection: enabled 2020/03/29 07:16:48 net device setup: enabled 2020/03/29 07:16:48 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/03/29 07:16:48 devlink PCI setup: PCI device 0000:00:10.0 is not available 07:18:33 executing program 0: syzkaller login: [ 148.782766][ T7209] IPVS: ftp: loaded support on port[0] = 21 [ 148.887093][ T7209] chnl_net:caif_netlink_parms(): no params data found 07:18:33 executing program 1: [ 148.987202][ T7209] bridge0: port 1(bridge_slave_0) entered blocking state [ 149.004845][ T7209] bridge0: port 1(bridge_slave_0) entered disabled state [ 149.014974][ T7209] device bridge_slave_0 entered promiscuous mode [ 149.024512][ T7209] bridge0: port 2(bridge_slave_1) entered blocking state [ 149.033434][ T7209] bridge0: port 2(bridge_slave_1) entered disabled state [ 149.041712][ T7209] device bridge_slave_1 entered promiscuous mode [ 149.071015][ T7209] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 149.082493][ T7209] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 149.116138][ T7209] team0: Port device team_slave_0 added [ 149.124235][ T7209] team0: Port device team_slave_1 added [ 149.156987][ T7209] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 149.166891][ T7209] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 149.195035][ T7209] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 149.216017][ T7355] IPVS: ftp: loaded support on port[0] = 21 [ 149.223882][ T7209] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 149.231113][ T7209] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 07:18:33 executing program 2: [ 149.259980][ T7209] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 149.332155][ T7209] device hsr_slave_0 entered promiscuous mode [ 149.387845][ T7209] device hsr_slave_1 entered promiscuous mode [ 149.537293][ T7399] IPVS: ftp: loaded support on port[0] = 21 07:18:34 executing program 3: [ 149.619437][ T7355] chnl_net:caif_netlink_parms(): no params data found [ 149.920216][ T7399] chnl_net:caif_netlink_parms(): no params data found [ 149.953364][ T7209] netdevsim netdevsim0 netdevsim0: renamed from eth0 07:18:34 executing program 4: [ 150.033632][ T7355] bridge0: port 1(bridge_slave_0) entered blocking state [ 150.041534][ T7355] bridge0: port 1(bridge_slave_0) entered disabled state [ 150.054172][ T7355] device bridge_slave_0 entered promiscuous mode [ 150.098663][ T7209] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 150.140055][ T7209] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 150.180645][ T7355] bridge0: port 2(bridge_slave_1) entered blocking state [ 150.198447][ T7355] bridge0: port 2(bridge_slave_1) entered disabled state [ 150.218311][ T7355] device bridge_slave_1 entered promiscuous mode [ 150.234007][ T7209] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 150.243248][ T7630] IPVS: ftp: loaded support on port[0] = 21 [ 150.340853][ T7664] IPVS: ftp: loaded support on port[0] = 21 07:18:34 executing program 5: [ 150.384023][ T7355] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 150.405876][ T7399] bridge0: port 1(bridge_slave_0) entered blocking state [ 150.427564][ T7399] bridge0: port 1(bridge_slave_0) entered disabled state [ 150.435265][ T7399] device bridge_slave_0 entered promiscuous mode [ 150.455989][ T7355] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 150.482567][ T7399] bridge0: port 2(bridge_slave_1) entered blocking state [ 150.490750][ T7399] bridge0: port 2(bridge_slave_1) entered disabled state [ 150.503917][ T7399] device bridge_slave_1 entered promiscuous mode [ 150.587006][ T7399] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 150.608851][ T7355] team0: Port device team_slave_0 added [ 150.616938][ T7399] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 150.655028][ T7355] team0: Port device team_slave_1 added [ 150.663004][ T7737] IPVS: ftp: loaded support on port[0] = 21 [ 150.691621][ T7399] team0: Port device team_slave_0 added [ 150.704750][ T7399] team0: Port device team_slave_1 added [ 150.720183][ T7355] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 150.727134][ T7355] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 150.759949][ T7355] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 150.777669][ T7355] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 150.785062][ T7355] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 150.812686][ T7355] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 150.838984][ T7399] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 150.845951][ T7399] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 150.873467][ T7399] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 150.922861][ T7399] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 150.930279][ T7399] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 150.957268][ T7399] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 151.030850][ T7355] device hsr_slave_0 entered promiscuous mode [ 151.058420][ T7355] device hsr_slave_1 entered promiscuous mode [ 151.097681][ T7355] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 151.106037][ T7355] Cannot create hsr debugfs directory [ 151.116561][ T7209] 8021q: adding VLAN 0 to HW filter on device bond0 [ 151.217119][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 151.226342][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 151.241618][ T7209] 8021q: adding VLAN 0 to HW filter on device team0 [ 151.253093][ T7630] chnl_net:caif_netlink_parms(): no params data found [ 151.300492][ T7399] device hsr_slave_0 entered promiscuous mode [ 151.358055][ T7399] device hsr_slave_1 entered promiscuous mode [ 151.417474][ T7399] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 151.425090][ T7399] Cannot create hsr debugfs directory [ 151.483740][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 151.492729][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 151.503611][ T3224] bridge0: port 1(bridge_slave_0) entered blocking state [ 151.510791][ T3224] bridge0: port 1(bridge_slave_0) entered forwarding state [ 151.534720][ T7664] chnl_net:caif_netlink_parms(): no params data found [ 151.567104][ T3222] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 151.614000][ T3222] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 151.624431][ T3222] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 151.634083][ T3222] bridge0: port 2(bridge_slave_1) entered blocking state [ 151.641202][ T3222] bridge0: port 2(bridge_slave_1) entered forwarding state [ 151.650870][ T3222] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 151.698018][ T7737] chnl_net:caif_netlink_parms(): no params data found [ 151.762691][ T7630] bridge0: port 1(bridge_slave_0) entered blocking state [ 151.770102][ T7630] bridge0: port 1(bridge_slave_0) entered disabled state [ 151.779497][ T7630] device bridge_slave_0 entered promiscuous mode [ 151.787413][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 151.825865][ T7630] bridge0: port 2(bridge_slave_1) entered blocking state [ 151.834092][ T7630] bridge0: port 2(bridge_slave_1) entered disabled state [ 151.843046][ T7630] device bridge_slave_1 entered promiscuous mode [ 151.893131][ T7664] bridge0: port 1(bridge_slave_0) entered blocking state [ 151.901873][ T7664] bridge0: port 1(bridge_slave_0) entered disabled state [ 151.912554][ T7664] device bridge_slave_0 entered promiscuous mode [ 151.919941][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 151.930234][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 151.938663][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 151.947837][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 151.956359][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 151.983062][ T7664] bridge0: port 2(bridge_slave_1) entered blocking state [ 151.993675][ T7664] bridge0: port 2(bridge_slave_1) entered disabled state [ 152.002476][ T7664] device bridge_slave_1 entered promiscuous mode [ 152.024823][ T7664] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 152.043869][ T3222] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 152.053468][ T3222] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 152.065927][ T7737] bridge0: port 1(bridge_slave_0) entered blocking state [ 152.074604][ T7737] bridge0: port 1(bridge_slave_0) entered disabled state [ 152.083011][ T7737] device bridge_slave_0 entered promiscuous mode [ 152.092762][ T7664] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 152.111450][ T7630] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 152.127389][ T7630] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 152.137017][ T7737] bridge0: port 2(bridge_slave_1) entered blocking state [ 152.144860][ T7737] bridge0: port 2(bridge_slave_1) entered disabled state [ 152.155177][ T7737] device bridge_slave_1 entered promiscuous mode [ 152.172288][ T7209] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 152.184057][ T7209] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 152.219708][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 152.231190][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 152.256238][ T7737] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 152.269447][ T7664] team0: Port device team_slave_0 added [ 152.283188][ T7355] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 152.321070][ T7630] team0: Port device team_slave_0 added [ 152.328438][ T7737] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 152.343233][ T7664] team0: Port device team_slave_1 added [ 152.365074][ T7355] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 152.410195][ T7630] team0: Port device team_slave_1 added [ 152.415969][ T7355] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 152.485690][ T7355] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 152.554206][ T7664] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 152.564811][ T7664] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 152.593147][ T7664] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 152.623662][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 152.634180][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 152.643784][ T7209] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 152.668774][ T7664] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 152.676431][ T7664] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 152.703341][ T7664] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 152.724827][ T7737] team0: Port device team_slave_0 added [ 152.738825][ T7737] team0: Port device team_slave_1 added [ 152.819801][ T7664] device hsr_slave_0 entered promiscuous mode [ 152.869223][ T7664] device hsr_slave_1 entered promiscuous mode [ 152.907349][ T7664] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 152.915048][ T7664] Cannot create hsr debugfs directory [ 152.921978][ T7630] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 152.929084][ T7630] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 152.955073][ T7630] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 152.978670][ T7737] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 152.985639][ T7737] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 153.014753][ T7737] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 153.026548][ T7399] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 153.097746][ T7630] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 153.104726][ T7630] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 153.131454][ T7630] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 153.158750][ T7737] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 153.165715][ T7737] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 153.192514][ T7737] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 153.211076][ T7399] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 153.331081][ T7737] device hsr_slave_0 entered promiscuous mode [ 153.387652][ T7737] device hsr_slave_1 entered promiscuous mode [ 153.427387][ T7737] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 153.434965][ T7737] Cannot create hsr debugfs directory [ 153.448064][ T7399] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 153.530802][ T7630] device hsr_slave_0 entered promiscuous mode [ 153.577933][ T7630] device hsr_slave_1 entered promiscuous mode [ 153.627418][ T7630] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 153.634998][ T7630] Cannot create hsr debugfs directory [ 153.649204][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 153.661560][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 153.680908][ T7399] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 153.783897][ T7355] 8021q: adding VLAN 0 to HW filter on device bond0 [ 153.836046][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 153.845333][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 153.860993][ T7209] device veth0_vlan entered promiscuous mode [ 153.881053][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 153.890950][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 153.941750][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 153.949572][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 153.980081][ T7209] device veth1_vlan entered promiscuous mode [ 154.008730][ T7355] 8021q: adding VLAN 0 to HW filter on device team0 [ 154.047641][ T2830] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 154.055630][ T2830] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 154.066387][ T2830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 154.075887][ T2830] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 154.085259][ T2830] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.093038][ T2830] bridge0: port 1(bridge_slave_0) entered forwarding state [ 154.102357][ T2830] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 154.111143][ T2830] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 154.125331][ T2830] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.132446][ T2830] bridge0: port 2(bridge_slave_1) entered forwarding state [ 154.140431][ T2830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 154.155191][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 154.197379][ T2757] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 154.222070][ T7664] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 154.264206][ T2757] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 154.274899][ T2757] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 154.283784][ T2757] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 154.294609][ T2757] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 154.303505][ T2757] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 154.312517][ T2757] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 154.322507][ T2757] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 154.331661][ T7209] device veth0_macvtap entered promiscuous mode [ 154.346385][ T7664] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 154.402599][ T7664] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 154.459948][ T7209] device veth1_macvtap entered promiscuous mode [ 154.471869][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 154.482947][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 154.492271][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 154.505299][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 154.514211][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 154.525581][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 154.537220][ T7664] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 154.588382][ T7355] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 154.619450][ T7399] 8021q: adding VLAN 0 to HW filter on device bond0 [ 154.660971][ T7737] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 154.729835][ T7737] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 154.786559][ T7737] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 154.859374][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 154.868247][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 154.875821][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 154.883730][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 154.893110][ T7399] 8021q: adding VLAN 0 to HW filter on device team0 [ 154.908924][ T7630] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 154.948965][ T7737] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 154.992808][ T7209] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 155.008311][ T3222] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 155.018396][ T3222] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 155.031864][ T3222] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.039243][ T3222] bridge0: port 1(bridge_slave_0) entered forwarding state [ 155.047804][ T3222] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 155.056384][ T3222] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 155.066304][ T7630] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 155.120594][ T7630] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 155.195163][ T7630] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 155.252720][ T7209] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 155.274294][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 155.283675][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 155.294031][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 155.305662][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 155.315495][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 155.324086][ T3224] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.332161][ T3224] bridge0: port 2(bridge_slave_1) entered forwarding state [ 155.340736][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 155.370311][ T7355] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 155.399951][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 155.494959][ T2830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 155.504294][ T2830] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 155.600590][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 155.609291][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 155.618354][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 155.627028][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 155.636694][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 155.645426][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 155.654270][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 155.666429][ T7399] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 155.770444][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 155.780338][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready 07:18:40 executing program 0: [ 155.823902][ T7355] device veth0_vlan entered promiscuous mode [ 155.844227][ T7664] 8021q: adding VLAN 0 to HW filter on device bond0 [ 155.876512][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 155.892631][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 07:18:40 executing program 0: [ 155.934265][ T7355] device veth1_vlan entered promiscuous mode [ 155.955906][ T7399] 8021q: adding VLAN 0 to HW filter on device batadv0 07:18:40 executing program 0: [ 155.980902][ T7737] 8021q: adding VLAN 0 to HW filter on device bond0 [ 155.996323][ T7664] 8021q: adding VLAN 0 to HW filter on device team0 [ 156.008278][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 156.016140][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 156.026395][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 156.035552][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 156.044188][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 07:18:40 executing program 0: 07:18:40 executing program 0: [ 156.077562][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 156.085846][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 156.112934][ T7630] 8021q: adding VLAN 0 to HW filter on device bond0 [ 156.164441][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 156.176351][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 156.192017][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 156.203257][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 07:18:40 executing program 0: [ 156.216632][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 156.232321][ T3221] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.239496][ T3221] bridge0: port 1(bridge_slave_0) entered forwarding state [ 156.248417][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 156.268133][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 156.276554][ T3221] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.283687][ T3221] bridge0: port 2(bridge_slave_1) entered forwarding state 07:18:40 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'iso8859-9'}}]}) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0xff, 0x404040) [ 156.311276][ T7737] 8021q: adding VLAN 0 to HW filter on device team0 [ 156.354934][ T3223] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 156.364362][ T3223] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 156.372794][ T3223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 156.382484][ T3223] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 156.392303][ T3223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 156.401639][ T3223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 156.410908][ T3223] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 156.419916][ T3223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 156.427047][ T8481] hfs: can't find a HFS filesystem on dev loop0 [ 156.440804][ T3223] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 156.452312][ T3223] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 156.461931][ T3223] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 156.482418][ T7630] 8021q: adding VLAN 0 to HW filter on device team0 [ 156.496062][ T7399] device veth0_vlan entered promiscuous mode [ 156.515264][ T7355] device veth0_macvtap entered promiscuous mode [ 156.532176][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 156.541238][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 156.558602][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 156.574462][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 156.583657][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 156.592835][ T3224] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.599981][ T3224] bridge0: port 1(bridge_slave_0) entered forwarding state [ 156.608207][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 156.616525][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 156.628024][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 156.641149][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 156.651027][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 156.663393][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 156.688062][ T7399] device veth1_vlan entered promiscuous mode [ 156.697821][ T7664] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 156.706250][ T7355] device veth1_macvtap entered promiscuous mode [ 156.724398][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 156.733117][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 156.741773][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 156.752577][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 156.761157][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 156.768978][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 156.776884][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 156.785927][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 156.794862][ T3221] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.801958][ T3221] bridge0: port 1(bridge_slave_0) entered forwarding state [ 156.810734][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 156.819443][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 156.827843][ T3221] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.834869][ T3221] bridge0: port 2(bridge_slave_1) entered forwarding state [ 156.842773][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 156.851868][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 156.860755][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 156.869513][ T3221] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.876554][ T3221] bridge0: port 2(bridge_slave_1) entered forwarding state [ 156.884236][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 156.895408][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 156.922507][ T7355] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 156.934479][ T7355] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 156.946629][ T7355] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 156.962557][ T3223] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 156.973772][ T3223] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 156.983921][ T3223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 156.995282][ T3223] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 157.004853][ T3223] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 157.016186][ T3223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 157.053647][ T7355] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 157.064211][ T7355] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 157.078857][ T7355] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 157.086640][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 157.095446][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 157.103518][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 157.112208][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 157.121149][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 157.130276][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 157.138909][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 157.147755][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 157.155915][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 157.164719][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 157.173290][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 157.181965][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 157.192156][ T7630] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 157.219204][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 157.229449][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 157.236917][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 157.245033][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 157.253943][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 157.262563][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 157.271138][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 157.286767][ T7664] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 157.396917][ T7399] device veth0_macvtap entered promiscuous mode [ 157.418682][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 157.428294][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 157.437878][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 157.446515][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 157.455358][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 157.463032][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 157.470638][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 157.481717][ T7737] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 157.494569][ T7399] device veth1_macvtap entered promiscuous mode [ 157.562517][ T7630] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 157.608132][ T3225] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 157.615660][ T3225] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 07:18:42 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r1, &(0x7f0000000040), 0x1c) recvfrom$inet6(r1, 0x0, 0x0, 0xf0de7f, 0x0, 0x0) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000000)=0x3, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local, 0x0, 0x3c}, 0x0, @in6=@ipv4={[], [], @multicast2}, 0x0, 0x0, 0x0, 0x6}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r2, &(0x7f0000000480), 0x2e9, 0x0) [ 157.662760][ T7737] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 157.685521][ T7399] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 157.710181][ T7399] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 157.728165][ T7399] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 157.745468][ T7399] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 157.771721][ T7399] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 157.788688][ T7399] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 157.799423][ T7399] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 157.812083][ T7399] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 157.823258][ T7399] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 157.839084][ T7399] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 157.854341][ T2760] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 157.877901][ T2760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 157.890360][ T2760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 157.900312][ T2760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 157.910316][ T2760] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 157.922683][ T2760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 157.940602][ T2760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 157.952238][ T2760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 158.029066][ T3225] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 158.044279][ T3225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 158.065096][ T3225] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 158.075530][ T3225] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 158.150317][ T7630] device veth0_vlan entered promiscuous mode [ 158.161395][ T7664] device veth0_vlan entered promiscuous mode [ 158.185352][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 158.205578][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 158.216582][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 158.233040][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 158.336642][ T7664] device veth1_vlan entered promiscuous mode [ 158.363520][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready 07:18:42 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) select(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1524}, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_emit_ethernet(0x0, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x11c000}) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup3(r3, r4, 0x0) ioctl$VIDIOC_DQBUF(r5, 0xc0585611, &(0x7f00000000c0)={0x8, 0x9, 0x4, 0x1000000, 0x1ff, {}, {0x3, 0x8, 0xff, 0x6, 0x0, 0x81, "5b78f034"}, 0x0, 0x1, @fd=r5, 0x2023}) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x40, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r6, r7, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r8, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x2e, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 158.384037][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 158.406541][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 158.428512][ T7630] device veth1_vlan entered promiscuous mode [ 158.435370][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 158.451240][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 158.461228][ T8510] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 158.512157][ T7737] device veth0_vlan entered promiscuous mode [ 158.535025][ T2830] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 158.544396][ T2830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 158.572487][ T7737] device veth1_vlan entered promiscuous mode [ 158.584979][ T7664] device veth0_macvtap entered promiscuous mode [ 158.599881][ T2830] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 158.609427][ T2830] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 158.618483][ T2830] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 158.626832][ T2830] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 158.636479][ T2830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 158.646049][ T2830] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 158.655951][ T2830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 158.667083][ T7630] device veth0_macvtap entered promiscuous mode [ 158.680697][ T2830] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 158.691785][ T2830] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 158.714225][ T7664] device veth1_macvtap entered promiscuous mode [ 158.722547][ T7630] device veth1_macvtap entered promiscuous mode [ 158.755892][ T2830] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 158.765488][ T2830] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 158.774286][ T2830] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 158.783025][ T2830] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 158.791904][ T2830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 158.811557][ T7737] device veth0_macvtap entered promiscuous mode [ 158.825032][ T7630] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 158.837563][ T7630] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 158.847840][ T7630] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 158.858640][ T7630] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 158.868941][ T7630] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 158.880073][ T7630] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 158.893557][ T7630] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 158.903767][ T7664] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 158.915892][ T7664] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 158.926892][ T7664] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 158.939065][ T7664] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 158.951380][ T7664] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 158.964235][ T7664] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 158.976132][ T7664] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 158.986706][ T7664] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 158.999546][ T7664] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 159.009952][ T7737] device veth1_macvtap entered promiscuous mode [ 159.021400][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 159.029645][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 159.039589][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 159.049101][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 159.058857][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 159.068266][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 159.080490][ T7630] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 159.092800][ T7630] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 159.104152][ T7630] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 159.118914][ T7630] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 159.130943][ T7630] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 159.144942][ T7630] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 159.160509][ T7630] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 159.171126][ T7664] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 159.183024][ T7664] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 159.193892][ T7664] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 159.204863][ T7664] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 159.215838][ T7664] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 159.226868][ T7664] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 159.237978][ T7664] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 159.249361][ T7664] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 159.264765][ T7664] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 159.287971][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 159.296482][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 159.307464][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 159.316075][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 07:18:44 executing program 3: syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x88c2, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000040)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000049000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 159.495071][ T7737] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 159.510580][ T7737] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 159.543314][ T7737] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 159.574724][ T7737] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 159.618661][ T7737] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 159.647524][ T7737] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 159.670108][ T7737] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 159.699627][ T7737] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 159.710294][ T7737] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 159.720783][ T7737] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 159.732700][ T7737] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 159.817573][ T2830] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 159.826315][ T2830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 159.838543][ T7737] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 159.849616][ T7737] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 159.861206][ T7737] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 159.872287][ T7737] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 159.882206][ T7737] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 159.892730][ T7737] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 159.902719][ T7737] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 159.913200][ T7737] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 159.923098][ T7737] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 159.934325][ T7737] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 159.946152][ T7737] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 160.026746][ T2830] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 160.035638][ T2830] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 07:18:44 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x15) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000040)={{}, 'syz0\x00'}) ioctl$UI_DEV_CREATE(r0, 0x5501) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r1, &(0x7f0000000280)={0x1a, 0x0, 0x7}, 0x10) sendmmsg(r1, &(0x7f00000001c0), 0x400000000000150, 0x0) [ 160.151675][ C0] hrtimer: interrupt took 25394 ns 07:18:44 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002740)=ANY=[@ANYBLOB='mno\a\x00\x00\x00,\x00']) r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x401, 0x40000) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000040)={0x0, @remote, @multicast1}, &(0x7f00000000c0)=0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 07:18:44 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00'}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_SPEED(r5, 0xc0045002, &(0x7f0000000000)) r6 = socket$inet(0x2, 0x2000000000003, 0x2) dup2(r6, r5) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup3(r7, r8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$TCSETA(r9, 0x5406, &(0x7f0000000100)={0x5, 0x2, 0x7, 0x8000, 0x16, "5ce85c928990eb0e"}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32=r3, @ANYRES32], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x4000000000002bc, 0x0) 07:18:44 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000002700000028001200090001007665740500000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r5, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_PAGE_FLIP(r7, 0xc01864b0, &(0x7f0000000200)={0x4, 0xfff, 0x2, 0x7f8000, 0x7}) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000001000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000005c0)=@newtfilter={0x294, 0x2c, 0xd27, 0x0, 0x40000, {0x0, 0x0, 0x0, r4, {0x2}, {0x10}, {0xf}}, [@filter_kind_options=@f_flow={{0x9, 0x1, 'flow\x00'}, {0x264, 0x2, [@TCA_FLOW_BASECLASS={0x8, 0x8, {0x2}}, @TCA_FLOW_EMATCHES={0x258, 0xb, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x4}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x10}}, @TCA_EMATCH_TREE_LIST={0x148, 0x2, 0x0, 0x1, [@TCF_EM_IPT={0x104, 0x3, 0x0, 0x0, {{0xcba, 0x9, 0x5}, [@TCA_EM_IPT_HOOK={0x8, 0x1, 0x1}, @TCA_EM_IPT_NFPROTO={0x5}, @TCA_EM_IPT_MATCH_DATA={0xbf, 0x5, "7fffddab4ea32bcb5b0002d960e8979b9b7b989a555674db72570ebe54f0f62ce1a8dd169e896ab5ad07194c0453ada22e23ddda5b57a4a761ead0fc86c35c16335588b1843622b9fd7947e044bc71f5580bb37453b51b384edd2b901e93c76abf939459c86d093290c194aff2eaa1c37f4ea7ce7fd38e97a1d153f7758818ea89d693d0b3dcbd4788b405011c4be41c3daa327959b01561f3a342ea7fca2770439c76e2c9b5ea0b0aa7d0118077ab06231491cf6951eb80151f70"}, @TCA_EM_IPT_NFPROTO={0x5, 0x4, 0xc}, @TCA_EM_IPT_MATCH_REVISION={0x5, 0x3, 0x3}, @TCA_EM_IPT_HOOK={0x8, 0x1, 0x1}, @TCA_EM_IPT_NFPROTO={0x5, 0x4, 0x2}, @TCA_EM_IPT_NFPROTO={0x5, 0x4, 0xa}]}}, @TCF_EM_IPSET={0x10, 0x2, 0x0, 0x0, {{0x9, 0x8, 0x3}, {0x1, 0x2, 0x2}}}, @TCF_EM_CMP={0x18, 0x3, 0x0, 0x0, {{0xfffb, 0x1, 0x9}, {0x10001, 0x3, 0x1ff, 0x4, 0x0, 0x0, 0x1}}}, @TCF_EM_CMP={0x18, 0x3, 0x0, 0x0, {{0x6758, 0x1, 0x1ff}, {0xde, 0xd6, 0xe8d0, 0x1, 0x9}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x3}}, @TCA_EMATCH_TREE_LIST={0xd0, 0x2, 0x0, 0x1, [@TCF_EM_IPSET={0x10, 0x3, 0x0, 0x0, {{0x7e6f, 0x8, 0x4}, {0x2, 0x3, 0x6}}}, @TCF_EM_CONTAINER={0xa0, 0x3, 0x0, 0x0, {{0x2, 0x0, 0x81}, "da91e57c8d338ad7263346d5abdadb083fb767fab31bf80f0a2eca6f2fa3038f9b54d31feb2ca14cfe509e5bba771b23066d043fa885a879f53be3599fc3fab8e6f969f598db3ec90ed5874f7a7ec19a1a328ea9ae8f18e6c528f39683a60bc4378c477ce50ac1582476205a4f606c6ce8a897061c9e2b4c7050eb97d393f778700533c7577b604ee13afef28bb85607ea55eed2"}}, @TCF_EM_U32={0x1c, 0x2, 0x0, 0x0, {{0x4, 0x3, 0xfff8}, {0x8, 0x3f, 0xfffeffff, 0xfffffffb}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x80}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0xe70e}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x7}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x2}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1}}]}]}}]}, 0x294}}, 0x0) 07:18:44 executing program 3: r0 = socket$inet6(0xa, 0x800000000000002, 0x40) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541e, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x7f, 0x0, 0x20000dd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0}) writev(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000200)="aecf25c1f361b29bf4e72ee4e6ae2af75f497f98b71983b77264ca2e9c", 0x1d}], 0x1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r2, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0xac14140d}, 0x10) recvfrom(r2, &(0x7f0000000100)=""/94, 0xffffffffffffff5e, 0x10100, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000040000000001000000004000000040010080002e360e59acaa4f37be5a0000ffff53ef", 0x261, 0x400}], 0x1, 0x0) r4 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x81, 0x29a080) ioctl$UI_SET_LEDBIT(r4, 0x40045569, 0x3) 07:18:44 executing program 0: prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000000)) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="0839db207acd5d20c054d40f01e8c7f04e1b8b1ac6d7f67958e7b7927ca392d368efd23b88f4afc58e19e9cb42a254d39e85e5693ce6b44256d4fe164a325526435b45f2e3c44b31e97cdb6cbaf116f59530f68d69ae3c204be99b7c13c146192c3f1f8f8c60ab7ad7a8b756eb4242a684cb24e827557622e75270c08bf2b2a40c70d57573d494e40dc823fc2c3e59c34d4d97e5e342efcaae27fb6c5a670f06e350dfb0383500775820d85a552ff8b815ad0466cc5c8cd55ce76b55d524e03a5e41bfeb0501feef89198eba3bbdda7fbf145add1bbd4fe04b7e2a3883"], 0x1) fallocate(r0, 0x3, 0x800000, 0x8020003) 07:18:44 executing program 2: connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote}, 0x1c) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket(0x10, 0x3, 0x0) r3 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) pread64(r3, &(0x7f0000000100)=""/98, 0x62, 0x1) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) write(0xffffffffffffffff, &(0x7f0000000180)="1c0000002200", 0x6) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 160.331338][ T8564] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 160.336454][ T8561] xfs: Unknown parameter 'mno' 07:18:45 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x15) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000040)={{}, 'syz0\x00'}) ioctl$UI_DEV_CREATE(r0, 0x5501) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r1, &(0x7f0000000280)={0x1a, 0x0, 0x7}, 0x10) sendmmsg(r1, &(0x7f00000001c0), 0x400000000000150, 0x0) 07:18:45 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x15) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000040)={{}, 'syz0\x00'}) ioctl$UI_DEV_CREATE(r0, 0x5501) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r1, &(0x7f0000000280)={0x1a, 0x0, 0x7}, 0x10) sendmmsg(r1, &(0x7f00000001c0), 0x400000000000150, 0x0) [ 160.443559][ T8556] EXT4-fs (loop3): invalid first ino: 3078822327 07:18:45 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000000)) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000400)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x1}, 0x20) 07:18:45 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_nlink(r2, &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'L-', 0x2}, 0x16, 0x2) r3 = socket(0x10, 0x803, 0x0) sendmsg$netlink(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000006c0)=@newlink={0x9c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x68, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x58, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e20}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @remote}, @IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x32}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @loopback}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8}]}, 0x9c}}, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000140)={0x0, 0x4, 0x5, 0xa6}) 07:18:45 executing program 5: socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-ssse3\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6803890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab3", 0x18}], 0x3}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c0000000806010300000000000000000000ff00050001100600000098b36ce135f4bc155226f81009a73889fd05000000eabaff719c20aa56f29e81778c03e100000080000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x4}, 0x0) 07:18:45 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x1b, 0x2}, 0x7) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000000)=@req3={0x2, 0x7fffffff, 0x0, 0x8, 0x8, 0x10001, 0x2}, 0x1c) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r6, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) getsockname$packet(r6, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYBLOB="380000001000050700"/20, @ANYRES32=r7, @ANYBLOB="00000016010000001800120008000100736974000c00020008000300", @ANYRES32=r8], 0x38}}, 0x0) connect$can_j1939(r4, &(0x7f0000000040)={0x1d, r7, 0x3, {0x0, 0x1}, 0xff}, 0x18) 07:18:45 executing program 5: setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10, r0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x80, 0xe47e, 0x7, 0x6, 0x9}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000200)={r1, 0xa7, "221a1e17b2f7cc19bc8a80b519c2430c4fc6a479d267bad96ff4ac015dcaf8dfa3aaefb0fac2580a1675f673aa9acc4a130532058bdafbdb685792c2455a0ff37028983b880353f265bdd16fb3fe01c6806e7fa1926fcf3c4aca6e53255af3344672a2f04d81d08a8677d396c078f86da68c3a72dff576a98f3fc3cd2ef04583d350feea196f33bc9af5bcee6c6a75f0089149b3e854901119ce1ab0a7d2f40dece95d2e5ca88f"}, &(0x7f0000000100)=0xaf) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r2, 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) timerfd_create(0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0x9) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000480)="4ee83d0e501a0a9e2701818730c3bee2bd35c725df8a6486d71476602261cbb7e2553cdf912bc652027692b6059acec7ff14ae040613ccf29508e96fb3822c11d8bcf050650b7c9fc8f894a8f34aa10e", 0x50}, {0x0}, {0x0}], 0x3, &(0x7f0000000500)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="340000000100", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="180000000100000002", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYBLOB="14000000010000000100", @ANYRES32=r2, @ANYRES32, @ANYBLOB="1c00000001000000010000", @ANYRES32, @ANYRES32, @ANYBLOB="d3283c79c5684cdcfb060caebefafb34a0255533c8fcdb60e3acc87e35b85701ba891f24b7d3810efc64a2e911cda6759160f31b08c4b4378e0ff36357d1e257c8497b9da932bf5b6c55bd182e1f2f50b98107f828d193748ba5313fd2f1c5d2884c47232fff96cde510587778d7494940259b9d34a86643b3468fdce3752c606c21ddec01bdf9df53f117b1d993b204c6d3debf5ef1570000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0x84}, 0x0) 07:18:45 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sysvipc/sem\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8923, 0x0) r0 = open(0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="00000000000000002800120009000100766574680000000018000200140001000000", @ANYRES32=0x0, @ANYBLOB="0000b200080000001028e6c46714"], 0x5}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="77456d97ffffffff0000000050cf01ac8a040071b1fe9e838800000000080002929ffdaacda057ed021d5b148d82e5f324ca283401b0a949395ae627009acd"], 0x2}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000340)) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21}, {0xa, 0x0, 0x0, @mcast1}, r2}}, 0x48) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040)=0x1, r2, 0x0, 0x2, 0x4}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x111}}, 0x20) [ 160.732216][ T8590] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 161.026371][ T8608] FAT-fs (loop5): bogus number of reserved sectors [ 161.039994][ T8608] FAT-fs (loop5): Can't find a valid FAT filesystem 07:18:45 executing program 4: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNGETVNETHDRSZ(r3, 0x800454d7, &(0x7f0000000080)) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='system.sockprotoname\x00', &(0x7f0000000140)=""/175, 0xaf) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="4c000000300effff00000000000000000000000038000100340001dd080001006d706c7300000000200002801c00020000000000000000000000000000000000000002000000000004040600251d2bf53b1940df2f762686647ab2d555c9473cd1e0172b51d19884895efafe5c02ea408643f6749ebfaa13626e33593b993a5b99bd12c72532b5fce2a8ff5489dd58ab4eeed8598ac0196c5afc279bc19edab89670c3e2054908de97b98eb32ed0d329849f825861ad527b8278c95950b4bde3a3f568d563e15d158b2262607150da97dc273b2b47ea1a8e33a0c0a8ea8d78164f4e9d905b1f9b6c5011f9dfdb5a1c24ec40f8005c9308e166"], 0x4c}}, 0x0) 07:18:45 executing program 5: setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10, r0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x80, 0xe47e, 0x7, 0x6, 0x9}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000200)={r1, 0xa7, "221a1e17b2f7cc19bc8a80b519c2430c4fc6a479d267bad96ff4ac015dcaf8dfa3aaefb0fac2580a1675f673aa9acc4a130532058bdafbdb685792c2455a0ff37028983b880353f265bdd16fb3fe01c6806e7fa1926fcf3c4aca6e53255af3344672a2f04d81d08a8677d396c078f86da68c3a72dff576a98f3fc3cd2ef04583d350feea196f33bc9af5bcee6c6a75f0089149b3e854901119ce1ab0a7d2f40dece95d2e5ca88f"}, &(0x7f0000000100)=0xaf) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r2, 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) timerfd_create(0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0x9) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000480)="4ee83d0e501a0a9e2701818730c3bee2bd35c725df8a6486d71476602261cbb7e2553cdf912bc652027692b6059acec7ff14ae040613ccf29508e96fb3822c11d8bcf050650b7c9fc8f894a8f34aa10e", 0x50}, {0x0}, {0x0}], 0x3, &(0x7f0000000500)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="340000000100", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="180000000100000002", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYBLOB="14000000010000000100", @ANYRES32=r2, @ANYRES32, @ANYBLOB="1c00000001000000010000", @ANYRES32, @ANYRES32, @ANYBLOB="d3283c79c5684cdcfb060caebefafb34a0255533c8fcdb60e3acc87e35b85701ba891f24b7d3810efc64a2e911cda6759160f31b08c4b4378e0ff36357d1e257c8497b9da932bf5b6c55bd182e1f2f50b98107f828d193748ba5313fd2f1c5d2884c47232fff96cde510587778d7494940259b9d34a86643b3468fdce3752c606c21ddec01bdf9df53f117b1d993b204c6d3debf5ef1570000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0x84}, 0x0) 07:18:45 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x214001, 0x0) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f00000000c0)=0x204) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000000)={0x0, 0xffff}) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000000)=""/174) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup(r3) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r5, 0x84, 0x18, &(0x7f00000001c0)={r7}, 0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000140)={r7, 0x0, 0x30}, &(0x7f00000001c0)=0xc) setsockopt$inet_sctp_SCTP_RTOINFO(r4, 0x84, 0x0, &(0x7f0000000200)={r8, 0x5, 0x7, 0xffffffff}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r2, r0) 07:18:45 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x61) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000005f00)=ANY=[@ANYBLOB="50010000100013070000000000000000fd55251159d3ccdbff01000000ec0000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES64=r0], 0x4}, 0x1, 0x0, 0x0, 0x40051}, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmmsg(r1, &(0x7f0000000180), 0xf1, 0x0) 07:18:45 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x1b, 0x2}, 0x7) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000000)=@req3={0x2, 0x7fffffff, 0x0, 0x8, 0x8, 0x10001, 0x2}, 0x1c) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r6, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) getsockname$packet(r6, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYBLOB="380000001000050700"/20, @ANYRES32=r7, @ANYBLOB="00000016010000001800120008000100736974000c00020008000300", @ANYRES32=r8], 0x38}}, 0x0) connect$can_j1939(r4, &(0x7f0000000040)={0x1d, r7, 0x3, {0x0, 0x1}, 0xff}, 0x18) 07:18:45 executing program 5: setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r1, r0, 0x0, 0x7ffff000) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000100)={0x90, 0x4, 0x8, 0x801, 0x0, 0x0, {0x7, 0x0, 0x4}, [@CTA_TIMEOUT_DATA={0x14, 0x4, 0x0, 0x1, @sctp=[@CTA_TIMEOUT_SCTP_COOKIE_WAIT={0x8, 0x2, 0x1, 0x0, 0x8}, @CTA_TIMEOUT_SCTP_COOKIE_WAIT={0x8, 0x2, 0x1, 0x0, 0x7}]}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_DATA={0x34, 0x4, 0x0, 0x1, @gre=[@CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0xb40a}, @CTA_TIMEOUT_GRE_REPLIED={0x8, 0x2, 0x1, 0x0, 0x80000000}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x800}, @CTA_TIMEOUT_GRE_REPLIED={0x8, 0x2, 0x1, 0x0, 0x881}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x4}, @CTA_TIMEOUT_GRE_REPLIED={0x8, 0x2, 0x1, 0x0, 0xff}]}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}, @CTA_TIMEOUT_DATA={0x14, 0x4, 0x0, 0x1, @tcp=[@CTA_TIMEOUT_TCP_FIN_WAIT={0x8, 0x4, 0x1, 0x0, 0x7ff}, @CTA_TIMEOUT_TCP_FIN_WAIT={0x8, 0x4, 0x1, 0x0, 0x7fffffff}]}]}, 0x90}, 0x1, 0x0, 0x0, 0x80}, 0x800) 07:18:45 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f0000000100), &(0x7f0000000140)=0x4) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180)='/dev/bsg\x00', 0x2000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x5) r5 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x1c) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0xf0de7f, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000240)={0x7f9f, {{0xa, 0x4e21, 0x1, @remote, 0x1}}}, 0x88) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) dup3(r5, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000016000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635202100000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r6 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_IRQCHIP(r5, 0x8208ae63, &(0x7f0000000700)={0x0, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}) ioctl$KVM_RUN(r6, 0xae80, 0x0) 07:18:46 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x28081) ioctl$USBDEVFS_CONTROL(r0, 0xc00c5512, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000140)) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r2, 0x4010ae68, &(0x7f0000000040)={0x0, 0x20000}) ioctl$KVM_CHECK_EXTENSION_VM(r2, 0xae03, 0xac) 07:18:46 executing program 4: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x101000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r1, 0xae03, 0x61) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r2, 0xae03, 0x61) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r3, 0xae03, 0x61) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r4, 0xae03, 0x61) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r5, 0xae03, 0x61) r6 = dup3(r5, r3, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000100)=r6) r7 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r7, 0x40106614, &(0x7f0000000280)) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000140)=[{0x0, 0x0, 0xffffffffffffffef}, {&(0x7f00000000c0)="e6", 0x1, 0x6}, {&(0x7f0000000080)="1d7e2bb9666e6ebd64582e1ae9dad62f201228a50f9919bc8f776c4223830489", 0x20, 0x9}], 0xc600, &(0x7f00000001c0)=ANY=[@ANYBLOB="666d61736b3d3030303030303046c35e04972c0040b3e761fe7132c263c5ae54fd0200e7eef194f21c4ec0bb00741be595e2148c67551e974f9390e4ceea1e76f459f9f110b74001c2a06deb39e4c9f548a465cfccfbefd8dfc57f6a0859e96b1a7312373e5de88dcf11cf7d1509064a0a2f00"/130]) 07:18:46 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000040)=0x1, 0x4) ioctl$KVM_CHECK_EXTENSION(r1, 0xae03, 0x61) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r3, &(0x7f0000000040), 0x1c) recvfrom$inet6(r3, 0x0, 0x0, 0xf0de7f, 0x0, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-ssse3\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) sendmmsg$sock(r5, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6803890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab3", 0x18}], 0x3}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000000c0)={{{@in6=@mcast2, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@initdev}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000200)={@dev={0xfe, 0x80, [], 0x2a}, @loopback, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4, 0x1, 0x873, 0x400, 0x6, 0x0, r6}) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x316002, 0x0) ioctl$KVM_CHECK_EXTENSION(r7, 0xae03, 0x61) dup3(r1, r2, 0x0) read$usbfs(r0, &(0x7f00000002c0)=""/129, 0x81) 07:18:46 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x20986100, 0x0, 0x0, 0x0, &(0x7f0000000100)="d353ff072d68b2e4dc14aa5fa8b3d94c22") r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-ssse3\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6803890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab3", 0x18}], 0x3}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) getsockname$packet(r5, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYBLOB="380000001000050700"/20, @ANYRES32=r6, @ANYBLOB="00000016010000001800120008000100736974000c00020008000300", @ANYRES32=r7], 0x38}}, 0x0) bind$can_raw(r3, &(0x7f0000000000)={0x1d, r6}, 0x10) 07:18:46 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x1b, 0x2}, 0x7) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000000)=@req3={0x2, 0x7fffffff, 0x0, 0x8, 0x8, 0x10001, 0x2}, 0x1c) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r6, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) getsockname$packet(r6, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYBLOB="380000001000050700"/20, @ANYRES32=r7, @ANYBLOB="00000016010000001800120008000100736974000c00020008000300", @ANYRES32=r8], 0x38}}, 0x0) connect$can_j1939(r4, &(0x7f0000000040)={0x1d, r7, 0x3, {0x0, 0x1}, 0xff}, 0x18) 07:18:46 executing program 2: r0 = socket$kcm(0x10, 0x5, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e48000034000505d25a802d8c63940d0424fc60100010400a000000053582c137153e370948018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 07:18:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x0, 0x7ec4, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f00000004c0)={0x6, &(0x7f00000003c0)="69e3fa92ff9c"}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x101000}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-ssse3\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6803890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab3", 0x18}], 0x3}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) sendmsg$IPSET_CMD_PROTOCOL(r3, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c40000001060102000000000000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x40000) mmap$IORING_OFF_SQES(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000001, 0x810, 0xffffffffffffffff, 0x10000000) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000040)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(0xffffffffffffffff, 0xae03, 0x9) ioctl$int_out(0xffffffffffffffff, 0x3, &(0x7f0000000480)) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0x2) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r5, 0xc058534b, &(0x7f0000000400)={0x3, 0x8, 0x8, 0x3, 0x80, 0x6e000000}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000fb], 0x10000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 07:18:46 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0xa, 0x10}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x3c}, 0x0, @in6=@loopback}}, 0xe8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-ssse3\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6803890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab3", 0x18}], 0x3}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) ioctl$SIOCPNENABLEPIPE(r3, 0x89ed, 0x0) r4 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-ssse3\x00'}, 0x58) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)) r6 = accept4(r5, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000400)=0x6, 0x4) sendmmsg$sock(r6, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6803890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab3", 0x18}], 0x3}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r6, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r7, 0x400, 0x3f6, 0x25dfdbfb, {{}, {}, {0x8, 0x11, 0xfffffffc}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x20000840) sendmmsg(r0, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0, 0x0, 0x0, 0x0, 0x7}}], 0x400000000000107, 0x0) 07:18:46 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) restart_syscall() r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) ftruncate(r0, 0x1000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000080)=""/4, 0x4}], 0x2d5) 07:18:46 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x7fff, 0x4) arch_prctl$ARCH_GET_CPUID(0x1011) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_inet_tcp_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000000c0)) sendmsg$inet6(r0, &(0x7f0000000040)={&(0x7f0000000080)={0xa, 0x7, 0x0, @rand_addr="39a4c14d00"}, 0x1c, 0x0}, 0x0) 07:18:46 executing program 5: setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r1, r0, 0x0, 0x7ffff000) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000100)={0x90, 0x4, 0x8, 0x801, 0x0, 0x0, {0x7, 0x0, 0x4}, [@CTA_TIMEOUT_DATA={0x14, 0x4, 0x0, 0x1, @sctp=[@CTA_TIMEOUT_SCTP_COOKIE_WAIT={0x8, 0x2, 0x1, 0x0, 0x8}, @CTA_TIMEOUT_SCTP_COOKIE_WAIT={0x8, 0x2, 0x1, 0x0, 0x7}]}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_DATA={0x34, 0x4, 0x0, 0x1, @gre=[@CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0xb40a}, @CTA_TIMEOUT_GRE_REPLIED={0x8, 0x2, 0x1, 0x0, 0x80000000}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x800}, @CTA_TIMEOUT_GRE_REPLIED={0x8, 0x2, 0x1, 0x0, 0x881}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x4}, @CTA_TIMEOUT_GRE_REPLIED={0x8, 0x2, 0x1, 0x0, 0xff}]}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}, @CTA_TIMEOUT_DATA={0x14, 0x4, 0x0, 0x1, @tcp=[@CTA_TIMEOUT_TCP_FIN_WAIT={0x8, 0x4, 0x1, 0x0, 0x7ff}, @CTA_TIMEOUT_TCP_FIN_WAIT={0x8, 0x4, 0x1, 0x0, 0x7fffffff}]}]}, 0x90}, 0x1, 0x0, 0x0, 0x80}, 0x800) 07:18:46 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x1b, 0x2}, 0x7) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000000)=@req3={0x2, 0x7fffffff, 0x0, 0x8, 0x8, 0x10001, 0x2}, 0x1c) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r6, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) getsockname$packet(r6, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYBLOB="380000001000050700"/20, @ANYRES32=r7, @ANYBLOB="00000016010000001800120008000100736974000c00020008000300", @ANYRES32=r8], 0x38}}, 0x0) connect$can_j1939(r4, &(0x7f0000000040)={0x1d, r7, 0x3, {0x0, 0x1}, 0xff}, 0x18) 07:18:46 executing program 2: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8937, &(0x7f0000000340)={'syz_tun\x00', 0x0}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x9, 0x4) sched_yield() r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r2, 0xae03, 0x61) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f00000001c0)={0x2, 0x4, 0x4, 0x400000, 0x7, {0x0, 0x2710}, {0x2, 0x2, 0x2, 0x8, 0x1, 0x3, "7eb736e1"}, 0x45f, 0x1, @planes=&(0x7f0000000180)={0xfff, 0x5, @fd, 0xcac}, 0x8, 0x0, r2}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1_to_batadv\x00', 0x1}, 0x18) connect$inet6(r1, &(0x7f0000000040), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000140)={0x8, 0x0, 0x6, 0x0, 0x2}, 0x14) recvfrom$inet6(r1, 0x0, 0x0, 0xf0de7f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000080)=@gcm_128={{0x304}, "eb0900", "e8ff47acbf84f4d6baa6eb7e1ba9e3d6", "000100", "6d53ff96690bb142"}, 0x28) r4 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x763, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f0000000280)={0x10000000, 0x8001}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r5, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$P9_RFLUSH(r7, &(0x7f00000002c0)={0x7, 0x6d, 0x2}, 0x7) ioctl$SIOCX25GDTEFACILITIES(r4, 0x89ea, &(0x7f0000000100)) 07:18:46 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000180)="eb3d90", 0x3}, {0x0, 0x0, 0x1a93}], 0x0, &(0x7f0000000080)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDCTL_DSP_GETFMTS(r1, 0x8004500b, &(0x7f00000000c0)) 07:18:46 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODESET_CTL(r2, 0x40086408, &(0x7f0000000000)={0xe4, 0xf2}) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x100010, r4, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6500) ftruncate(r5, 0x8200) write$cgroup_type(r5, &(0x7f0000000200)='threaded\x00', 0x175d900f) [ 162.429407][ T8729] FAT-fs (loop2): bogus number of reserved sectors [ 162.448734][ T8729] FAT-fs (loop2): This looks like a DOS 1.x volume, but isn't a recognized floppy size (26 sectors) [ 162.471812][ T8729] FAT-fs (loop2): Can't find a valid FAT filesystem 07:18:47 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r4}, 0x14) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r8 = dup3(r7, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) setsockopt$packet_tx_ring(r8, 0x107, 0xd, &(0x7f00000000c0)=@req3={0x2, 0x4, 0x10000, 0x200, 0x7fff, 0x1, 0x82a}, 0x1c) r9 = dup3(r5, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) write$FUSE_NOTIFY_RETRIEVE(r9, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x4, 0x1, 0x6}}, 0x30) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0}, &(0x7f0000000340)=0x99) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r10, @ANYBLOB="00000000000000000c0016800800018004000c8004001400"], 0x30}}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x1c, 0x0, 0x1}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0x68, 0x0, 0x2, 0x70bd25, 0x25dfdbff, {{}, {}, {0x4c, 0x18, {0x8, @media='udp\x00'}}}, ["", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4004021}, 0x940) 07:18:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-ssse3\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) getsockopt$PNPIPE_INITSTATE(r4, 0x113, 0x4, &(0x7f0000000140), &(0x7f0000000180)=0x4) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYRES32=r3, @ANYRES32=r1, @ANYBLOB="000000000000000024001280110001009f70f591408a35a16c617665000000f1ce70d23f6c2efebce7eb5980ca1f0e1aeddbeb398ba681892d5b39406871d2351a109553d801b93404bbe643baaff541ecca2c222a314aa85149a68c5bb30cfe9b675d31ba76e61159bfb7248dcf00000000000000"], 0x3}}, 0x0) [ 162.604138][ T8729] FAT-fs (loop2): bogus number of reserved sectors [ 162.611565][ T8729] FAT-fs (loop2): This looks like a DOS 1.x volume, but isn't a recognized floppy size (26 sectors) [ 162.623466][ T8729] FAT-fs (loop2): Can't find a valid FAT filesystem 07:18:47 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x1b, 0x2}, 0x7) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000000)=@req3={0x2, 0x7fffffff, 0x0, 0x8, 0x8, 0x10001, 0x2}, 0x1c) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r6, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) getsockname$packet(r6, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYBLOB="380000001000050700"/20, @ANYRES32=r7, @ANYBLOB="00000016010000001800120008000100736974000c00020008000300", @ANYRES32=r8], 0x38}}, 0x0) 07:18:47 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = dup3(r3, r1, 0x0) recvfrom$unix(r4, &(0x7f0000000000)=""/35, 0x23, 0xf15bc974dc16809a, &(0x7f0000000240)=@file={0x1, './file0\x00'}, 0x6e) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000100)={[], 0x0, 0x71ac7}) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000700)={0x0, 0x0, @pic={0x0, 0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}}) ioctl$KVM_RUN(r5, 0xae80, 0x0) 07:18:47 executing program 0: r0 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000003c0)={0xffffffff, 0x24b, 0x3ff, 0x7be, 0x3}, 0x14) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, &(0x7f0000000100)=0x1, 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$bt_BT_SECURITY(r4, 0x112, 0x4, &(0x7f0000000040)={0x8}, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r5, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) r8 = getpgrp(0x0) setpriority(0x0, r8, 0xffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000640)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000240)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000080)='security/}GPLloself.vmnet1eth1\x00', &(0x7f0000000400)='dummy0\x00']) [ 162.884663][ T8761] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 07:18:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6803890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab3", 0x18}], 0x3}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getpeername$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmsg$BATADV_CMD_GET_DAT_CACHE(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x1c, r4, 0x31905e13403123b7, 0x0, 0x0, {0x7, 0x0, 0xf000}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r7}]}, 0x1c}, 0x1, 0x50000}, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r4, 0x10, 0x70bd29, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000801}, 0x20040016) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r8 = socket$packet(0x11, 0x3, 0x300) r9 = dup(r8) setsockopt$packet_int(r9, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r10 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r12 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x630802, 0x0) setsockopt$PNPIPE_INITSTATE(r12, 0x113, 0x4, &(0x7f0000000040)=0x1, 0x4) bind$packet(r8, &(0x7f0000000640)={0x11, 0x0, r11, 0x1, 0x0, 0x6, @multicast}, 0x14) sendto$inet6(r8, &(0x7f0000000300)="0503000006023e0001d841a0c52cf7c25975e697b02f86dd6b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a8816107d08f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x40ed) 07:18:47 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x400, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r1, 0x810c5701, 0x0) userfaultfd(0x80000) openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mkdir(0x0, 0x0) rmdir(0x0) r2 = gettid() r3 = syz_open_procfs(r2, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(r5, r5) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}]}}) 07:18:47 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200, 0x181101) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$USBDEVFS_BULK(r0, 0x80045515, &(0x7f00000000c0)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r6, 0xae03, 0x61) ioctl$FS_IOC_MEASURE_VERITY(r6, 0xc0046686, &(0x7f0000000240)={0x1, 0x72, "0c97627e426e446cabaaecb65890ffdc76c8e83be92e4c6af641d01d82e9413fe0dadba4361053004b64496bf6782e0dab79f86689c2b9bb536f4891f33ab11e71034cec32c4217cf4b98d8959fb1b52e386850b163649803c1769273e93781e32c21b54063bd02b6be305f1d2b644b7354a"}) sendmsg$can_j1939(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x1d, 0x0, 0x0, {0x1, 0xf0, 0x1}}, 0x18, &(0x7f00000001c0)={&(0x7f0000000100)="4f995dcdd2e880607c2c5b5495ecafc7c372ec0c194cc1347bf65bec6732483184e81f15f268382ba89dde32c3b3f265bd8bbd57acf8135a28a7cb81a352ec44ef09511cde79e48f6bb5db518c0b10e0e2dcdd680a1f7788d37e295b178199fd35cfc2fe1e0a2facc33854ebdac19223fb02cc09e0f9973f37d442086ccd4609b3a4014513fed7dbb0da58eb3a40503eed33", 0x92}, 0x1, 0x0, 0x0, 0x20004001}, 0x801) ioctl$SNDRV_PCM_IOCTL_PAUSE(r5, 0x40044145, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup3(r7, r8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(r10, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000000)={0x28, r11, 0x221, 0x0, 0x0, {}, [@NL80211_ATTR_WDEV={0xc}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x5}]}, 0x28}}, 0x0) sendmsg$NL80211_CMD_SET_STATION(r9, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r11, 0x100, 0x70bd26, 0x25dfdbfe, {}, [@NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x68}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000001) 07:18:47 executing program 0: r0 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000003c0)={0xffffffff, 0x24b, 0x3ff, 0x7be, 0x3}, 0x14) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, &(0x7f0000000100)=0x1, 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$bt_BT_SECURITY(r4, 0x112, 0x4, &(0x7f0000000040)={0x8}, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r5, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) r8 = getpgrp(0x0) setpriority(0x0, r8, 0xffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000640)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000240)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000080)='security/}GPLloself.vmnet1eth1\x00', &(0x7f0000000400)='dummy0\x00']) [ 163.165193][ T8791] usb usb2: usbfs: process 8791 (syz-executor.5) did not claim interface 0 before use 07:18:47 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x1b, 0x2}, 0x7) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000000)=@req3={0x2, 0x7fffffff, 0x0, 0x8, 0x8, 0x10001, 0x2}, 0x1c) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) getsockname$packet(r5, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) 07:18:47 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000"}) write$binfmt_aout(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="fc"], 0x1) ioctl$TCSETA(r0, 0x5406, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x7d, 0x0, "078cf0251c0e00"}) syz_mount_image$vfat(&(0x7f0000000200)='vfat\x00', &(0x7f0000000240)='./bus\x00', 0x2, 0x5, &(0x7f0000000940)=[{&(0x7f0000000580)="0e398a58d72e791f27cafebff505aaccacbd0d633c4ae22256ab6b29518042b8c522cbaf6d962772623829a21df37c1f9cedbb9df1af4fed698a5d5138a6fcd2b651de19534edc7ad6cedf9f47009073fe549c94ef47ddde2907feea16281ea240b8829118d7beb6f60784e0c48f62c3297079889c260ac9d47d92bb60353c147788142c754a68f08b572d0a483d4b4e5a35d490841daf925d46ed013e3d17b2469e35e20c6866b43332c4231c37892bbd01e9371771cb006514d1458a7c2c285d027255ff045aaf1f58367feb569f1ebc7667", 0xd3, 0x4}, {&(0x7f0000000680)="b731c78a8768eff3345435d7a2d0cfc0ae981990a0dfb95a6c1edbc9ff4a0ae04a85b20b0001c167aa383d74cb901e9d41870da46cad665fc15f4420267a56f87fce6e9491345f86bfd7606217d27ce748be4879c095733af48457e785452a423b20c72710fd00d6555e22", 0x6b, 0xff}, {&(0x7f0000000700)="7867cb297f0fb590fa5ea0a3fb80abc4ffe07c59adabfbc2bc2e76b754af7efcd941e5227dba928e2e12493f2d53fb9a1d376a18207fea3f729b6935795806d965aaacc17143c121d9ea3c3605c853ae3cc1f04d02c830ed882ac193325c2b5f3cb88503d865f2cc1da2ab2a6a1bb6553788845b7eaeb0b63c548f590a44b94a78993dce41aef0e445c71cadd36fb0a25ca0ba89dd5c7952a07a9705ca31780d7453f2489093d9b4747413e29bd4001ac79da5d76b9a", 0xb6, 0x401}, {&(0x7f00000007c0)="302cd85901d8bb286e2fb532e2aa8a51dfa7c77c51e9426cdab5d2aaacf02d876bd8fe97a0c7dab4d123bf2ce53cdccf202c4a1b330840f738edcccf6f7d03e02a2926eecff9e1be2a2b9403a1531298468986a15681563d2eb022299e62f0865691ac9e89bde9f5dee513d9e2e0a630c0b59e64b0d1eb50b901914a72e24a4678b9b92525b6122f392cdb26c787b2fe03ab1cfb8bdac5929d9cb0b91bd54dc9e4213b158ce2f20f0dcbb232bf7e48854a027d710794f13db08213aa2f0b2eab181861f8fde41ad5ba7f10d221156a79f55ef02151fbb6f958d5d01e4ab81bacfcf0b7d58f19617929e4fec08406096e8fc0bbf2282a9cfc3f", 0xf9, 0x3ff}, {&(0x7f00000008c0)="859e8f0f820b16661d53add12ec126598adacc57d8c0831d4f0d696196e0f1fd633de34c9b5ddcbecf3e61ddb7b70fd4c8f2cbf5fcb157a1f380db7e556c6f00e6a48751e40a", 0x46, 0x401}], 0xc01010, &(0x7f0000000500)={[{@shortname_winnt='shortname=winnt'}, {@uni_xlate='uni_xlate=1'}]}) r1 = syz_open_pts(r0, 0x0) r2 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x98428d57a99b5f44) io_setup(0xd, &(0x7f0000000100)=0x0) getsockopt$SO_J1939_ERRQUEUE(r2, 0x6b, 0x4, &(0x7f00000009c0), &(0x7f0000000a00)=0x4) io_submit(r3, 0x200002f1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r2, &(0x7f0000000000), 0x377140be6b5ef4c7}]) io_submit(r3, 0x2, &(0x7f00000001c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x3, r1, &(0x7f00000002c0)="491df9bdf03cdfb15886e246cf691f47ce474c94f59865480cffdefaa222533d75be8ccfb429b9f4814017afd4dea6aef641cb8de98d37ce8a297120eb1f61912909f302c769c1c8547b1bffbb360fcd0c4bebc07ccc041a97543437c21d2930f2d73c3a15dfc3d06b5cd2ab8a7009e135966180104211212a8604231905429e7678d43fc5c682b7aa3b2a1b158ef36a7e636f95bbdd0dd54cb91a980f289b634e84bf87dbcfdcce6bac86d213f3bdc55f0e18542fc5fc8f0706d0e75f0d7d8b690499c0407843419fbf51b9691ae86c89c533d7fc1c7f3dda935188d4eb49f70036d1b5d0af9e8b8a92d902ca", 0xed, 0x7fffffff, 0x0, 0x4}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2, 0x4, 0xffffffffffffffff, &(0x7f00000003c0)="2ca10c7dff4f095a590e66d27550978e4cb193e6b02342e2c53800765754934925cf1bd68dd5a6eeb00661a34b91a061fcc64b79306e9749e92f94ac8e824baaae9b4866ff75a1f2cdf3a0686a7b2e36ec6f2a21ffa1d2bd39300fc0b43cf7f637579338fffe589d7cc5799fcb898ff3f67373bffb6c14713e3b9ae4406c6d8e7b3831b706009ccd66f47ea08509b2ec5f794646eacb89589c5f847f9cd14313da25680137fcc51e112e2c8aed409180c3fa747e21d757407010f030bbe9a1c30d48cad1025bceeb89800c9595", 0xcd, 0x1, 0x0, 0x6}]) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r4, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$UFFDIO_WAKE(r6, 0x8010aa02, &(0x7f0000000080)={&(0x7f0000ff1000/0xe000)=nil, 0xe000}) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000040)) 07:18:48 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r1, 0xae03, 0x61) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x40000, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2, 0x28011, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000200)="080db18cd32a8c5a65f5eedff6c977e1fb267075b465127a2c91fb00"/38) r4 = socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r4, 0x660c) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) r5 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x4, 0x88000) r6 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ubi_ctrl\x00', 0x0, 0x0) poll(&(0x7f0000000140)=[{r5, 0x3012}, {r6, 0x7004}], 0x2, 0x93d) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r7, r3, 0x0, 0x100000002) 07:18:48 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x1b, 0x2}, 0x7) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000000)=@req3={0x2, 0x7fffffff, 0x0, 0x8, 0x8, 0x10001, 0x2}, 0x1c) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) 07:18:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000c40000000000", @ANYRES32=r5, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r6, 0xae03, 0x61) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000a80)=@newtfilter={0x5e0, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {0x4}, {0x9}}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x5b0, 0x2, [@TCA_RSVP_PINFO={0x20, 0x4, {{0x200, 0x7, 0x80}, {0x8, 0xd630, 0x2}, 0x8, 0x1f}}, @TCA_RSVP_POLICE={0x10, 0x5, [@TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x7f}]}, @TCA_RSVP_CLASSID={0x8, 0x1, {0xffff, 0xf}}, @TCA_RSVP_ACT={0x144, 0x6, [@m_xt={0x140, 0xb, 0x0, 0x0, {{0x7, 0x1, 'xt\x00'}, {0x4c, 0x2, 0x0, 0x1, [@TCA_IPT_INDEX={0x8, 0x3, 0x3}, @TCA_IPT_TARG={0x35, 0x6, {0x2, 'raw\x00', 0x6f, 0x101, "b19395bcd8d24311072413"}}, @TCA_IPT_INDEX={0x8, 0x3, 0x6}]}, {0xe5, 0x6, "3268ab4845bfca8e1d6919e214d311f3bc0d4212cae11c3dbf38476bf5765ef28a783abf96581b7a47bd054a3afce1d812383c91b8ed1a40c6edfe5656d5099255c52c62c710835fceb126cbb4d61bb07e6f330da6bd0f229d4ac1365f84515eee603bb985eb675431a5853fed2bdccf7a415ecc6f41cfa522a02c3652b30bd6f53d5d152291f93815ef6fcddd4737fe6f4a4b3b715be2982d61c0a3ce9a518a74d49b7d6489895b42020feed7e69025c840f1fd0bcec7d1d8be06af25dbb6a521d7a275632852ac2dbc99df14244a2d9fbdfbfdf09871da12e080fc0e3f3422ca"}}}]}, @TCA_RSVP_SRC={0x14, 0x3, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @TCA_RSVP_ACT={0x13c, 0x6, [@m_bpf={0x138, 0x1e, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x44, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18, 0x2, {0xfffffffe, 0x5, 0x8, 0x80000001, 0x9}}, @TCA_ACT_BPF_FD={0x8, 0x5, r6}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x6, 0xffffffff, 0x8, 0x80, 0xff}}, @TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}]}, {0xe6, 0x6, "73f4709cb9905bb58f4353ab1e11470a0dc33afb01f1b2222199b14a6ef88f2b5ed591eefc1a40d5a859d3340b99b1f5986b255779293fd83e7ade4efc894f2db070d28a7f9526aeab7cd392d92693bb178db616329212b5e69e271d299ef3a44c54af0533a1473a9e0fcf5d1bb74c8590ccf613fabcaca5b27bd7a25a4460522ea148c775c9cf4452db652c9abed1ecf0715942e2ab57f37db04147405e23a1b4ed1b2cf5afe60a895405213673ccac81df3734ef9210bf452bb8cf3c9eb59902b148f9a5595a3139a76cd3313a254a9020e564909f7cddb5219785cf6a6dced8aa"}}}]}, @TCA_RSVP_ACT={0x2cc, 0x6, [@m_skbmod={0x154, 0xb, 0x0, 0x0, {{0xb, 0x1, 'skbmod\x00'}, {0x4c, 0x2, 0x0, 0x1, [@TCA_SKBMOD_DMAC={0xa, 0x3, @local}, @TCA_SKBMOD_SMAC={0xa, 0x4, @remote}, @TCA_SKBMOD_DMAC={0xa, 0x3, @multicast}, @TCA_SKBMOD_PARMS={0x24, 0x2, {{0x0, 0x1, 0x3, 0x0, 0x1000}, 0xd}}]}, {0xf5, 0x6, "e94923945c5cd25f5fdafd69701817b2e8cde6df435e43b40158aa4b94c5697b4a83e8b44ba7d1cde9583fb88b06dde945e96317f20b77fbf3a20a4d3c2027321b3a2558e80c6f6fbaf1c6be8e7ba9506936fb596b3b887eba5ae917ad4de033add3ba32573f44446c45fc23550467990a500ce1895bfc135a480b099caf77ed46a07c32e178ee0f540402d656bbf349169908535db573c0c6d4be3882e213e17b2e05c28e1fc83addadc30e77952c15ab1f713e6ac8f79d22ea05d5643ca08c2d37a038117b199179f0d97d65e6bc3faf7c6ae6f3631385621751c62f072f8f9c450d7b16ae57e7952fa05b68a282252a"}}}, @m_csum={0xec, 0x15, 0x0, 0x0, {{0x9, 0x1, 'csum\x00'}, {0x3c, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0x1eadcace, 0x9, 0x7, 0x6, 0x6}, 0x71}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x5, 0x4, 0x4, 0x8, 0x50}, 0x68}}]}, {0x9d, 0x6, "799bf5b9201755652d916542a4c68b77b327e6cea8e3603a31a9b566cdb6e338445dbeb3be2c68e1e103bb17d6456b8fde6c911eaf3ce31f9670f9243083e6ffaee90427f37a42c46c7f88bd6c70bb4f5ce788e95d1055b4f910314b6220191f8bb0845ba9f0f7d406e1fb2d66786c95fa680786588ecbc831e87938e562492977192abbb822e786429bd01eb2b064a62ae6c6f4739e0e7aa6"}}}, @m_sample={0x88, 0xb, 0x0, 0x0, {{0xb, 0x1, 'sample\x00'}, {0x1c, 0x2, 0x0, 0x1, [@TCA_SAMPLE_TRUNC_SIZE={0x8, 0x4, 0xf4}, @TCA_SAMPLE_PSAMPLE_GROUP={0x8, 0x5, 0x7fff}, @TCA_SAMPLE_PSAMPLE_GROUP={0x8, 0x5, 0x5}]}, {0x5c, 0x6, "18693653142a66a05a8089b8591b08b44e7160c572aae08ae8c1d80bdfe79dc62b396cbad8e7fd3176cc37658fe8ffdce2d8bd437241327f0f1aa565afb11f48c33c2de38dde0243abb1c2fff0c41da12ffb90cadacf9b8e"}}}]}, @TCA_RSVP_DST={0x14, 0x2, @mcast2}]}}]}, 0x5e0}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000a40)=ANY=[@ANYBLOB="3c0000002800ed7ef44f00"/20, @ANYRES32=r5, @ANYBLOB="04000000000000000000000009000100666c6f7700000000040002000600050020000000"], 0x3c}}, 0x0) 07:18:48 executing program 1: r0 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x125) r2 = socket(0x2, 0x803, 0xff) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) r3 = dup(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r4 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) ftruncate(r1, 0x800fe) sendfile(r3, r4, 0x0, 0x80000000000d) write$binfmt_aout(r0, &(0x7f0000000280)=ANY=[@ANYRESOCT], 0x17) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) [ 163.862231][ T27] audit: type=1804 audit(1585466328.438:2): pid=8830 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir512640042/syzkaller.Ez6oNX/11/bus" dev="sda1" ino=15808 res=1 07:18:48 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x1b, 0x2}, 0x7) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000000)=@req3={0x2, 0x7fffffff, 0x0, 0x8, 0x8, 0x10001, 0x2}, 0x1c) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) 07:18:49 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x1b, 0x2}, 0x7) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000000)=@req3={0x2, 0x7fffffff, 0x0, 0x8, 0x8, 0x10001, 0x2}, 0x1c) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) 07:18:49 executing program 5: r0 = syz_open_dev$binderN(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000000)={0x8, 0x0, &(0x7f0000003340)=[@exit_looper, @enter_looper], 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$LOOP_CTL_ADD(r3, 0x4c80, r5) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) [ 164.423527][ T8786] fuse: Bad value for 'fd' [ 164.644793][ T27] audit: type=1804 audit(1585466329.218:3): pid=8822 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir727832393/syzkaller.Tdyhz8/7/cgroup.controllers" dev="sda1" ino=15793 res=1 [ 164.756935][ T27] audit: type=1804 audit(1585466329.238:4): pid=8830 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir512640042/syzkaller.Ez6oNX/11/bus" dev="sda1" ino=15808 res=1 [ 164.829088][ T27] audit: type=1804 audit(1585466329.248:5): pid=8828 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir727832393/syzkaller.Tdyhz8/7/cgroup.controllers" dev="sda1" ino=15793 res=1 [ 164.943171][ T27] audit: type=1804 audit(1585466329.248:6): pid=8849 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir727832393/syzkaller.Tdyhz8/7/cgroup.controllers" dev="sda1" ino=15793 res=1 [ 165.799048][ T8786] fuse: Bad value for 'fd' 07:18:50 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="62aa50c1e332beadd52d26073e5bfa09ef1ea85302f93de19de2263ec882fe99030bfbc9bcaaf1993edd5c2ecdd1225b32e6a60c4f5c689cc856e364ef6e313f824b1dc2f2c27eedfd1185c1ef83c8362af39af4aaf3cc277fd46e7f1259626f16e6494d93449614a3eaaa4fb6f935aefa98f845468d0f8b87e131cc2a96fd9b2166ee5ea3b8811efd4376cc"], 0xda00) bind$l2tp(r0, &(0x7f0000000000)={0x2, 0x0, @loopback, 0x3}, 0x10) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$cgroup_int(r5, &(0x7f0000000200), 0x12) 07:18:50 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2115040, &(0x7f0000000380)={[{@ikeep='ikeep'}]}) 07:18:50 executing program 1: r0 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x125) r2 = socket(0x2, 0x803, 0xff) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) r3 = dup(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r4 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) ftruncate(r1, 0x800fe) sendfile(r3, r4, 0x0, 0x80000000000d) write$binfmt_aout(r0, &(0x7f0000000280)=ANY=[@ANYRESOCT], 0x17) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) 07:18:50 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x1b, 0x2}, 0x7) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000000)=@req3={0x2, 0x7fffffff, 0x0, 0x8, 0x8, 0x10001, 0x2}, 0x1c) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socket$netlink(0x10, 0x3, 0x0) 07:18:50 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0, @ANYBLOB="2c646d61736b3d303030303030303f00000000000000000000000000000000004b26430db435c38cd4d75503f4844fb0b508"]) 07:18:50 executing program 0: r0 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000003c0)={0xffffffff, 0x24b, 0x3ff, 0x7be, 0x3}, 0x14) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, &(0x7f0000000100)=0x1, 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$bt_BT_SECURITY(r4, 0x112, 0x4, &(0x7f0000000040)={0x8}, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r5, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) r8 = getpgrp(0x0) setpriority(0x0, r8, 0xffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000640)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000240)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000080)='security/}GPLloself.vmnet1eth1\x00', &(0x7f0000000400)='dummy0\x00']) [ 166.029571][ T27] audit: type=1804 audit(1585466330.598:7): pid=8873 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir512640042/syzkaller.Ez6oNX/12/bus" dev="sda1" ino=15825 res=1 07:18:50 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_pts(r3, 0x40040) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x2000000, 0x13, r4, 0xc641c000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r5, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$DRM_IOCTL_SWITCH_CTX(r7, 0x40086424, &(0x7f0000000040)={0x0, 0x2}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="4abc"], 0x2) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 166.111717][ T8874] ntfs: (device loop4): parse_options(): Invalid dmask option argument: 0000000? 07:18:50 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x1b, 0x2}, 0x7) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000000)=@req3={0x2, 0x7fffffff, 0x0, 0x8, 0x8, 0x10001, 0x2}, 0x1c) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 07:18:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r3, &(0x7f0000000040), 0x1c) recvfrom$inet6(r3, 0x0, 0x0, 0xf0de7f, 0x0, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000480)={0xa00000, 0x1, 0x200, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)={0x980901, 0x101, [], @p_u16=&(0x7f0000000100)=0xfffe}}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f00000004c0)={0x40000000}) accept4(r3, &(0x7f00000001c0)=@rc={0x1f, @none}, &(0x7f0000000000)=0x80, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r5, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$sock_inet_SIOCRTMSG(r7, 0x890d, &(0x7f0000000240)={0x0, {0x2, 0x4e20, @rand_addr=0x3ff}, {0x2, 0x4e22, @local}, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x1c0, 0x0, 0x0, 0x0, 0x8, &(0x7f00000000c0)='ip6gre0\x00', 0x0, 0x6, 0x3}) syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0xffffffff, 0x141300) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-avx\x00'}, 0x58) r8 = accept4(r0, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(r8, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f0000000380)=ANY=[@ANYRESDEC, @ANYBLOB="8400b72aa77f888dff71967de1b9c7", @ANYRES64, @ANYPTR, @ANYRES32=0x0, @ANYRES64=r5, @ANYPTR64=&(0x7f0000000500)=ANY=[@ANYRES64=r6, @ANYBLOB="f12278d6eeff65348e57723374cb4806877bc98a941799f8545b66a028a8254247e470bdf0b86fb2e3b829e9e463c407b22e8feb33664bf694c31f7f056ed3f18f6e935dd8572fdf1ed6e14c49d43823ef086241b867db6a3478acc724eafac19cb5ba176ff3d2b915faaaa96011323a8190b1c3b19c26cf767dd2f8792d64cc298e4f812390af7ebfac6f3f0151fcc53077f4c23fbcd257"], @ANYRES16], @ANYRESOCT, @ANYRESDEC=r5, @ANYRES32=0x0, @ANYBLOB="0c009900000000000000000000009900000000000000000008000300", @ANYRES32=0x0, @ANYRESDEC], 0x7}, 0x1, 0x0, 0x0, 0x4}, 0x4881) [ 166.251611][ T8874] ntfs: (device loop4): parse_options(): Invalid dmask option argument: 0000000? 07:18:50 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x400141442, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1800007, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x202, &(0x7f00000004c0)=0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ftruncate(r3, 0x8200) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0xf6) open(&(0x7f0000000040)='./bus\x00', 0x2000, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) connect$inet(r4, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r7, 0xae03, 0x61) fcntl$getflags(r7, 0x0) sendmmsg(r4, &(0x7f0000007fc0), 0x400000000000030, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='trusted.overlay.redirect\x00', &(0x7f0000000200)='./bus\x00', 0x6, 0x1) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) 07:18:50 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=@newtfilter={0x58, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x2}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x28, 0x2, [@TCA_BASIC_EMATCHES={0x24, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x2e23}}, @TCA_EMATCH_TREE_LIST={0x18, 0x2, 0x0, 0x1, [@TCF_EM_CANID={0x14, 0x1, 0x0, 0x0, {{}, {{0x0, 0x0, 0x0, 0x1}}}}]}]}]}}]}, 0x58}}, 0x0) r5 = syz_open_dev$media(&(0x7f0000000300)='/dev/media#\x00', 0x1ff, 0x100) ioctl$USBDEVFS_SETINTERFACE(r5, 0x80085504, &(0x7f0000000340)={0x9}) 07:18:50 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0, @ANYBLOB="2c646d61736b3d303030303030303f00000000000000000000000000000000004b26430db435c38cd4d75503f4844fb0b508"]) 07:18:51 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x1b, 0x2}, 0x7) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000000)=@req3={0x2, 0x7fffffff, 0x0, 0x8, 0x8, 0x10001, 0x2}, 0x1c) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r3, 0x0) 07:18:51 executing program 5: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 166.504169][ T27] audit: type=1804 audit(1585466331.078:8): pid=8906 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir329481563/syzkaller.QnF4fm/12/bus" dev="sda1" ino=15833 res=1 [ 166.538558][ T8908] ntfs: (device loop4): parse_options(): Invalid dmask option argument: 0000000? 07:18:51 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0, @ANYBLOB="2c646d61736b3d303030303030303f00000000000000000000000000000000004b26430db435c38cd4d75503f4844fb0b508"]) 07:18:51 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000680)=@ipv6_getroute={0x1c, 0x1a, 0x1}, 0x1c}}, 0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_SWBIT(r3, 0x4004556d, 0xf) 07:18:51 executing program 2: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r3, 0x10e, 0x2, &(0x7f0000000080)=0xe, 0x4) sendmmsg$inet6(r0, &(0x7f0000005540)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c, &(0x7f0000002340)=[{&(0x7f0000000040)="12", 0x1}], 0x1}}, {{&(0x7f00000025c0)={0xa, 0x0, 0x0, @local, 0x40}, 0x1c, &(0x7f0000003700)=[{&(0x7f0000002600)='/', 0x1}], 0x1}}], 0x2, 0x0) 07:18:51 executing program 0: r0 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000003c0)={0xffffffff, 0x24b, 0x3ff, 0x7be, 0x3}, 0x14) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, &(0x7f0000000100)=0x1, 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$bt_BT_SECURITY(r4, 0x112, 0x4, &(0x7f0000000040)={0x8}, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r5, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) r8 = getpgrp(0x0) setpriority(0x0, r8, 0xffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000640)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000240)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000080)='security/}GPLloself.vmnet1eth1\x00', &(0x7f0000000400)='dummy0\x00']) 07:18:51 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x1b, 0x2}, 0x7) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000000)=@req3={0x2, 0x7fffffff, 0x0, 0x8, 0x8, 0x10001, 0x2}, 0x1c) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r3, 0x0) 07:18:51 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mount(&(0x7f00000000c0)=@sr0='/dev/sr0\x00', &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='bpf\x00', 0x40000, &(0x7f0000000180)='ppp1vmnet0#@vmnet0\x00') mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="2f6465762f6e62603000d4e15cd20e6f87faf8913439bfd261aac3ac0e944f"], &(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='reiserfs\x00', 0xc900, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0xee00) getresgid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) chown(&(0x7f0000000200)='./file0\x00', r1, r2) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-ssse3\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6803890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab3", 0x18}], 0x3}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) 07:18:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000180)=ANY=[@ANYBLOB="600000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000340012800c0001006d6163766c616e002400028008000100100000000800030003000000100005800a0004000400000000000000"], 0x60}}, 0x0) 07:18:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x37cb1133) r5 = socket$inet(0x2, 0x3, 0x33) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r6, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x8006}, 0x4) bind$inet(r4, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x25}}, 0x10) connect$inet(r4, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x30000, 0x0) splice(r2, 0x0, r7, 0x0, 0x19401, 0xf) ioctl$EXT4_IOC_SWAP_BOOT(r5, 0x6611) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0xbc, r8, 0x1, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x400}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}]}, @TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x401}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x800}]}, @TIPC_NLA_PUBL={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x5}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xf03}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x80}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x2}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x6}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8f7a}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xbd36}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1ff}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x7ff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x80000000}]}]}, 0xbc}, 0x1, 0x0, 0x0, 0x4040}, 0x1) socket$nl_audit(0x10, 0x3, 0x9) 07:18:51 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0, @ANYBLOB="2c646d61736b3d303030303030303f00000000000000000000000000000000004b26430db435c38cd4d75503f4844fb0b508"]) 07:18:51 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xe) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) r2 = syz_open_procfs(r1, &(0x7f00000000c0)='net/vlan/config\x00') r3 = open(&(0x7f00000001c0)='./file0\x00', 0x210040, 0xf) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r3, 0x4008ae48, &(0x7f0000000200)=0x100000) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) futimesat(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{r4, r5/1000+10000}, {0x77359400}}) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x80000, 0x0) ioctl$TCSETXF(r6, 0x5434, &(0x7f0000000080)={0x1f, 0x6, [0xfffb, 0x100, 0x1, 0xfffd, 0xfffe], 0x4fe5}) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sysvipc/shm\x00', 0x0, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000240)) sendfile(r0, r7, 0x0, 0x4000000000010046) 07:18:51 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0xfffffffffffffdfc, &(0x7f0000000180)={0x0}}, 0x40000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="2967138b9678c0247dfef930a34eccbb17b55a0bda82294982a16bb414427c01ecd35428550000000000000005a95b9dc1ed3c1cf579fa9d01000004a04442df99f0a7e8b26235266ac8251a69158200000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000b00)=@newtfilter={0x484, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xfff1}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x454, 0x2, [@TCA_BASIC_POLICE={0x450, 0x4, [@TCA_POLICE_RATE={0x404, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, @TCA_POLICE_RATE64={0xc}, @TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x0, 0x0, 0x0, 0xfffffff9, {0x1f, 0x0, 0x0, 0x0, 0x0, 0x2}, {0xbe}}}]}]}}]}, 0x484}}, 0x0) 07:18:51 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x1b, 0x2}, 0x7) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000000)=@req3={0x2, 0x7fffffff, 0x0, 0x8, 0x8, 0x10001, 0x2}, 0x1c) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r3, 0x0) 07:18:51 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3f, 0x49, 0x1, 0x85, 0x2, 0x2, 0x6, 0x3, 0x11e, 0x40, 0x2f0, 0x3ff, 0x8000, 0x38, 0x2, 0x8001, 0x8, 0x8}, [{0x6474e551, 0x3b, 0x2, 0x100000000000, 0x8000, 0x5e3, 0x5, 0x6}, {0x5, 0x5, 0x5eea, 0x5, 0x5, 0x0, 0x6, 0x9d4}], "3d705e489e96aa4e10f1108881a00518c8bfe6e8f5cd869639219e761db77ccff3decac593f6a09503955eb7ef7a96bd81f628b2580dd2df87d8497db86a0c5d6c6eaf78", [[], [], []]}, 0x3f4) ioctl$KVM_CHECK_EXTENSION(r1, 0xae03, 0x61) write(r1, &(0x7f0000000000)="48f8ca88e018f7b7a2d278fa8f043a99871f9b17f831d6ed93a367498f417a9e364c5d44a831", 0x26) 07:18:51 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0, @ANYBLOB="2c646d61736b3d303030303030303f00000000000000000000000000000000004b26430db435c38cd4d75503f4844fb0b508"]) 07:18:51 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000140)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="0400000000000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000001c0)=ANY=[@ANYRES16=0x0]) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x61) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6(0xa, 0x4, 0x7ff) ioctl$VIDIOC_TRY_EXT_CTRLS(r3, 0xc0205649, &(0x7f0000000180)={0x4, 0x7ffd, 0x812f, r4, 0x0, &(0x7f0000000080)={0x9a090b, 0x4730, [], @string=&(0x7f0000000000)=0x2}}) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000240)=""/4096) 07:18:51 executing program 2: syz_emit_ethernet(0x76, &(0x7f0000000080)={@broadcast=[0xff, 0xff, 0xff, 0x0], @random="8b8262f0d040", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a4f008", 0x40, 0x3a, 0x0, @ipv4={[], [], @loopback}, @mcast2, {[], @pkt_toobig={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, "0024e6", 0x0, 0x2c, 0x0, @ipv4={[], [], @rand_addr=0xfffffffe}, @remote, [@routing={0x2f, 0x0, 0x0, 0x2}], "000022ebffff0000"}}}}}}}, 0x0) 07:18:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket(0x10, 0x80002, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)={0x40, r3, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x10, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7ff}]}]}]}]}, 0x40}}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r3, 0xde15925688030539, 0x70bd29, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PHYADDR={0x5, 0x3, 0xbb}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x24000081) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_STATS_ENABLED={0x5}, @IFLA_BR_MCAST_IGMP_VERSION={0x5}]}}}]}, 0x44}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r4, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup3(r8, r9, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_ASSOCINFO(r10, 0x84, 0x1, &(0x7f00000004c0)={0x0, 0x6, 0x3, 0x6, 0x57c, 0x8}, 0x14) sendmsg$DEVLINK_CMD_PORT_SET(r6, &(0x7f0000000480)={&(0x7f0000000200), 0xc, &(0x7f0000000440)={&(0x7f0000000300)={0x124, r7, 0x10, 0x70bd27, 0x25dfdbfb, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x6, 0x4, 0x3}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x6, 0x4, 0x2}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}, {0x6, 0x4, 0x1}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x6, 0x4, 0x2}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}, {0x6, 0x4, 0x3}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x6, 0x4, 0x1}}]}, 0x124}, 0x1, 0x0, 0x0, 0x14}, 0x4048000) 07:18:51 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0, @ANYBLOB="2c646d61736b3d303030303030303f00000000000000000000000000000000004b26430db435c38cd4d75503f4844fb0b508"]) 07:18:52 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) write$9p(r3, &(0x7f00000001c0)="3a5bfe19060024fd04c5e10281ac5b00c90e845854882f4070b07d50a199a8ef1170219534771b0d815938383dc16344d89b7c31145ca0aa4fc2e0bce78049f7feec7cf979873387f04a3802da146fa44dc7604e2a7af17c81935ea6e84f6f50feb0d0ae3b", 0x26) truncate(&(0x7f0000000000)='./file0\x00', 0x1) 07:18:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x37cb1133) r5 = socket$inet(0x2, 0x3, 0x33) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r6, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x8006}, 0x4) bind$inet(r4, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x25}}, 0x10) connect$inet(r4, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x30000, 0x0) splice(r2, 0x0, r7, 0x0, 0x19401, 0xf) ioctl$EXT4_IOC_SWAP_BOOT(r5, 0x6611) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0xbc, r8, 0x1, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x400}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}]}, @TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x401}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x800}]}, @TIPC_NLA_PUBL={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x5}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xf03}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x80}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x2}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x6}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8f7a}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xbd36}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1ff}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x7ff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x80000000}]}]}, 0xbc}, 0x1, 0x0, 0x0, 0x4040}, 0x1) socket$nl_audit(0x10, 0x3, 0x9) 07:18:52 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'syz_tun\x00', 0x0}) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r5, 0xae03, 0x61) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYRESHEX=r5, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0001000007000100667100003400020008000a000000000008000500000000000800030040eb67928d68cb0080007e79b51e6bd5080008400c000008ffc824fde4b1560bfa837abf60279e2df35825d21cd2e103b03b5d9d0580b02cbcbbee8c6da40c60b230696714e89acaad8cab954b78a56b58249750e368c21f56d16cfa000000"], 0x3}}, 0x0) r6 = socket(0x1000000010, 0x80002, 0x0) r7 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r7, &(0x7f0000000040), &(0x7f00000001c0)=0x14) sendmmsg$alg(r6, &(0x7f0000000200), 0x10efe10675dec16, 0x0) 07:18:52 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x1b, 0x2}, 0x7) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000000)=@req3={0x2, 0x7fffffff, 0x0, 0x8, 0x8, 0x10001, 0x2}, 0x1c) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 07:18:52 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0, @ANYBLOB="2c646d61736b3d303030303030303f00000000000000000000000000000000004b26430db435c38cd4d75503f4844fb0b508"]) 07:18:52 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3, 0x4000010, r0, 0x2000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000002940)={&(0x7f0000000000)=@newtaction={0x58, 0x30, 0x53b, 0x0, 0x0, {}, [{0x44, 0x1, [@m_sample={0x40, 0x1, 0x0, 0x0, {{0xb, 0x1, 'sample\x00'}, {0x2c, 0x2, 0x0, 0x1, [@TCA_SAMPLE_PARMS={0x18}, @TCA_SAMPLE_RATE={0x8}, @TCA_SAMPLE_PSAMPLE_GROUP={0x8}]}, {0x4}}}]}]}, 0x58}}, 0x0) sendfile(r2, r1, 0x0, 0x10000000f) 07:18:52 executing program 1: io_setup(0x70f, &(0x7f0000000180)=0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x4000000004002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r5, 0x84, 0x18, &(0x7f00000001c0)={r7}, 0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r4, 0x84, 0xf, &(0x7f00000003c0)={r7, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3c}}}, 0x87, 0x8, 0xff, 0xf0, 0xc1f5}, &(0x7f0000000100)=0x98) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) io_submit(r0, 0x2, &(0x7f00000006c0)=[&(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x10, r1, &(0x7f00000017c0)="81", 0x1}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x4, 0x0, r8, 0x0}]) 07:18:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r1, &(0x7f0000000040), 0x1c) recvfrom$inet6(r1, 0x0, 0x0, 0xf0de7f, 0x0, 0x0) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f0000000000)) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r3, 0x200004) sendfile(r0, r3, 0x0, 0x80001d00c0d0) 07:18:52 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0, @ANYBLOB="2c646d61736b3d303030303030303f00000000000000000000000000000000004b26430db435c38cd4d75503f4844fb0b508"]) 07:18:52 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0, @ANYBLOB="2c646d61736b3d303030303030303f00000000000000000000000000000000004b26430db435c38cd4d75503f4844fb0b508"]) 07:18:52 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x1b, 0x2}, 0x7) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000000)=@req3={0x2, 0x7fffffff, 0x0, 0x8, 0x8, 0x10001, 0x2}, 0x1c) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 07:18:53 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0, @ANYBLOB="2c646d61736b3d303030303030303f00000000000000000000000000000000004b26430db435c38cd4d75503f4844fb0b508"]) 07:18:53 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 07:18:53 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x37cb1133) r5 = socket$inet(0x2, 0x3, 0x33) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r6, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x8006}, 0x4) bind$inet(r4, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x25}}, 0x10) connect$inet(r4, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x30000, 0x0) splice(r2, 0x0, r7, 0x0, 0x19401, 0xf) ioctl$EXT4_IOC_SWAP_BOOT(r5, 0x6611) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0xbc, r8, 0x1, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x400}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}]}, @TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x401}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x800}]}, @TIPC_NLA_PUBL={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x5}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xf03}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x80}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x2}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x6}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8f7a}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xbd36}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1ff}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x7ff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x80000000}]}]}, 0xbc}, 0x1, 0x0, 0x0, 0x4040}, 0x1) socket$nl_audit(0x10, 0x3, 0x9) 07:18:53 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="540000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000002800120001006d6163766c616e0018f702800401feffffffffffff00000008000400"/58], 0x54}}, 0x0) 07:18:53 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 07:18:53 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x1b, 0x2}, 0x7) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000000)=@req3={0x2, 0x7fffffff, 0x0, 0x8, 0x8, 0x10001, 0x2}, 0x1c) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 168.867890][ T9069] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 168.889177][ T9069] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 168.901165][ T9070] __ntfs_error: 8 callbacks suppressed [ 168.901173][ T9070] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 07:18:53 executing program 0: sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x200004}, 0x0, 0x9, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000000), &(0x7f0000000080)=0x8) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000140)=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e22, 0x4, @ipv4={[], [], @multicast1}, 0x1}}, 0x24) sendmmsg(0xffffffffffffffff, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}}], 0x1, 0x0) prctl$PR_SET_TIMERSLACK(0x1d, 0x2) socket$kcm(0x10, 0x2, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0xfffffffb, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r1, 0x8982, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffc) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="485b72a28bc57e3ce037728bc171d7508adb15c7c4f33d46946a538a315a2494a4568180142e0bdc2fbafe2796dcad5b41b7d421cd2910268964e7664774cbd60d12fa92b3c2c92848628e24536f851bf20ae7b270a7983c744938a9c392", @ANYRESHEX, @ANYBLOB="2c726f6f74656f64653d30303030303030309eee303030303030303030093030302c757365725f6964", @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:18:53 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 07:18:53 executing program 1: clone(0xd7e0ce5d01a5091b, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@volatile={0x0, 0x0, 0x0, 0x8, 0xffffffff}]}}, &(0x7f0000004600)=""/206, 0x26, 0xce, 0x8}, 0x20) r0 = add_key(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f00000002c0)='4', 0xba, 0xfffffffffffffffe) keyctl$chown(0x5, r0, 0x0, 0x0) keyctl$describe(0x6, r0, &(0x7f00000002c0)=""/130, 0x82) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-ssse3\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6803890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab3", 0x18}], 0x3}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000380)='trusted.overlay.upper\x00', &(0x7f0000001000)={0x0, 0xfb, 0x1015, 0x1, 0x2, "63b66b6d00eed8a47a935e74a43cce46", "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"}, 0x1015, 0x3) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f00000000c0)={0x3, 0x2}, 0x4) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="140000002a000505d25a80648c63940d0224fc60", 0x14}], 0x1}, 0x0) 07:18:53 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 07:18:53 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x1b, 0x2}, 0x7) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000000)=@req3={0x2, 0x7fffffff, 0x0, 0x8, 0x8, 0x10001, 0x2}, 0x1c) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 169.163995][ T9084] fuse: Unknown parameter 'H[r¢‹Å~<à7r‹Áq×PŠÛÇÄó' [ 169.168202][ T9086] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 169.179747][ T9087] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 169.211880][ T9095] BPF:[1] TYPEDEF (anon) [ 169.225046][ T9095] BPF:type_id=4294967295 [ 169.239305][ T9095] BPF: [ 169.256767][ T9095] BPF:Invalid type_id 07:18:53 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0]) [ 169.256773][ T9095] BPF: [ 169.256773][ T9095] [ 169.273712][ T9099] fuse: Unknown parameter 'H[r¢‹Å~<à7r‹Áq×PŠÛÇÄó' 07:18:53 executing program 2: socket$packet(0x11, 0x3, 0x300) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="5f45fa52f5040a0080118b3cf4037e54ff703a878ca6b8"], 0xa) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) close(r2) socket$netlink(0x10, 0x3, 0x4) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r7, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r7, &(0x7f0000000040), 0x1c) recvfrom$inet6(r7, 0x0, 0x0, 0xf0de7f, 0x0, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000000), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff40) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 07:18:53 executing program 1: mkdir(&(0x7f00000002c0)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./bus\x00', 0x2) mount(0x0, &(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='sysfs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,xino=on']) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) getdents(r3, &(0x7f0000000180)=""/197, 0x20000245) [ 169.397732][ T9108] ntfs: (device loop4): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 169.433893][ T9111] overlayfs: failed to resolve './file0': -2 [ 169.442981][ T9108] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 07:18:54 executing program 5: socket$kcm(0x2, 0x1000000000000005, 0x0) socket$kcm(0x2, 0x922000000001, 0x106) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r5, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/bsg\x00', 0x181180, 0x0) move_mount(r4, &(0x7f0000000000)='./file0\x00', r7, &(0x7f0000000040)='./file0\x00', 0x0) r8 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e21, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory', 0xc}]}, 0xfdef) 07:18:54 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x1b, 0x2}, 0x7) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000000)=@req3={0x2, 0x7fffffff, 0x0, 0x8, 0x8, 0x10001, 0x2}, 0x1c) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 07:18:54 executing program 2: mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x5c832, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000040)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_LISTALL(r3, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0xf4, r4, 0x1, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0x10, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf5}]}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0xfffffffffffffffe}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_MLSCATLST={0x6c, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x19d0860e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x53f181ae}]}, {0x4}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x726a}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x5736}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb27a}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7957}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc0d5}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x28fa}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x5dfc}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2665}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x54, 0x8, 0x0, 0x1, [{0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x72}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1c7561e7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x84}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x11331cd5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6f528dd1}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x522adedd}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x85}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x18b73083}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xca}]}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x8045}, 0x0) mmap(&(0x7f0000000000/0xda6000)=nil, 0xda6000, 0x0, 0x64031, 0xffffffffffffffff, 0x0) 07:18:54 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0]) 07:18:54 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0]) [ 169.817107][ T9131] ntfs: (device loop4): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 169.818680][ T9134] ntfs: (device loop1): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 169.855533][ T9131] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 07:18:54 executing program 0: r0 = syz_open_dev$binderN(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = shmget$private(0x0, 0x2000, 0x0, &(0x7f000000b000/0x2000)=nil) shmat(r1, &(0x7f000000c000/0x3000)=nil, 0x3000) shmctl$IPC_STAT(r1, 0x2, &(0x7f0000000000)=""/57) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000080)={0x14, 0x0, &(0x7f0000000180)=[@release={0x40046304}, @free_buffer={0x40046304}], 0x0, 0x719000, 0x0}) 07:18:54 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x1b, 0x2}, 0x7) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000000)=@req3={0x2, 0x7fffffff, 0x0, 0x8, 0x8, 0x10001, 0x2}, 0x1c) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 07:18:54 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0]) [ 169.960830][ T9134] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 07:18:54 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'ipvlan0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r4}, 0x14) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r5, 0xae03, 0x61) r6 = dup2(r5, r1) getsockname$packet(r6, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000180)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="3c0000001000810500"/20, @ANYRES32=0x0, @ANYBLOB="b300000000006f7a16f2df0000120012000b0001006970766c616e0000040002", @ANYRES32=r7, @ANYRESDEC=r3], 0x5}}, 0x0) r8 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r8, &(0x7f0000000140), 0x2, 0x0) 07:18:54 executing program 5: clock_gettime(0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x800000a, 0x0) socket$inet6(0xa, 0x2, 0x0) socket$inet6(0xa, 0x2, 0x4) fstat(0xffffffffffffffff, &(0x7f00000007c0)) socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xffff}, 0x3028a, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x800000a, 0x0) lstat(0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) prctl$PR_MCE_KILL_GET(0x22) add_key$user(0x0, 0x0, &(0x7f0000000700), 0x0, 0xfffffffffffffffa) openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(&(0x7f0000fbe000)='./file0\x00', 0x0, 0x80) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) 07:18:54 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0]) [ 170.062526][ T9149] binder: 9148:9149 unknown command 0 [ 170.084121][ T9149] binder: 9148:9149 ioctl c0306201 20000080 returned -22 07:18:54 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000180)=0x6, 0x4) r0 = socket(0x400020000000010, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) getsockname$packet(r4, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYBLOB="380000001000050700"/20, @ANYRES32=r5, @ANYBLOB="00000016010000001800120008000100736974000c00020008000300", @ANYRES32=r6], 0x38}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8918, &(0x7f0000000040)={@rand_addr="feef27077032695817c311ec36379666", 0x0, r6}) connect$packet(r0, &(0x7f0000000100)={0x11, 0x4, r6, 0x1, 0x42, 0x6, @dev={[], 0x36}}, 0x14) connect$inet6(r1, &(0x7f0000000040), 0x1c) recvfrom$inet6(r1, 0x0, 0x0, 0xf0de7f, 0x0, 0x0) accept(r1, 0x0, &(0x7f0000000000)) r7 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0xa043, 0x0) setsockopt$CAN_RAW_ERR_FILTER(r7, 0x65, 0x2, &(0x7f0000000040)=0x2b, 0x4) write(r0, &(0x7f0000a1cf6c)="1f00000070000d0000000000fc07ff1b070404003d02000007000100010039", 0x1f) [ 170.138758][ T9155] ntfs: (device loop4): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. 07:18:54 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000007c0)=@newtaction={0x47c, 0x30, 0x1, 0x0, 0x0, {}, [{0x468, 0x1, [@m_police={0x464, 0x1, 0x0, 0x0, {{0xb, 0x1, 'police\x00'}, {0x450, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE={0x404, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x572701a9]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, {0x3, 0x0, 0x0, 0x0, 0x0, 0x40}}}, @TCA_POLICE_RATE64={0xc, 0x8, 0x200000000000}]]}, {0x4}}}]}]}, 0x47c}}, 0x0) sched_yield() 07:18:54 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0, @ANYBLOB]) 07:18:55 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0]) 07:18:55 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x1b, 0x2}, 0x7) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 07:18:55 executing program 0: syz_mount_image$nfs4(&(0x7f0000000040)='nfs4\x00', &(0x7f0000000100)='./file0\x00', 0x800, 0x3, &(0x7f0000001400)=[{&(0x7f0000000280)="a09c8903a2ded8ef1babdf46fdaea4fb9697d365ca1100f4c6bc02600aee56451ea8b5f8e62b07c202c849364d60f2700b65d10042902e54783deda50b710b1077f60bacdf936770", 0x48, 0x4}, {&(0x7f0000000300)="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", 0xfe, 0x6}, {&(0x7f0000000400)="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", 0x1000, 0x7}], 0x0, &(0x7f0000001480)='bdev\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x2c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8, 0x1, r3}]}, @IFLA_GROUP={0x8}]}, 0x34}}, 0x0) 07:18:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0xee00) syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x20000, &(0x7f00000000c0)=ANY=[@ANYBLOB='fownsr>', @ANYRESDEC=r1, @ANYBLOB=',appraise,\x00']) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) io_uring_register$IORING_UNREGISTER_EVENTFD(r4, 0x5, 0x0, 0x0) 07:18:55 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0, @ANYBLOB]) 07:18:55 executing program 1: syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0]) 07:18:55 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0, @ANYBLOB]) [ 170.655348][ T9211] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 07:18:55 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0, @ANYBLOB]) [ 170.705522][ T9211] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 170.717522][ T9211] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 07:18:55 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x1b, 0x2}, 0x7) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 170.800194][ T9211] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 07:18:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1a, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0x81, 0x1, 0x0, &(0x7f0000048000), 0x0) 07:18:55 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0, @ANYBLOB]) 07:18:55 executing program 1: syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0]) 07:18:55 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x1b, 0x2}, 0x7) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 07:18:55 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0, @ANYBLOB=',dmask=0000000?\x00'/25]) 07:18:55 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0, @ANYBLOB]) 07:18:55 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x1b, 0x2}, 0x7) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 07:18:55 executing program 1: syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0]) 07:18:55 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0, @ANYBLOB]) 07:18:55 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 07:18:56 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0, @ANYBLOB]) 07:18:56 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0]) 07:18:56 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0, @ANYBLOB]) 07:18:56 executing program 2: syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0, @ANYBLOB]) 07:18:56 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 07:18:56 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0]) 07:18:56 executing program 0: r0 = socket$nl_crypto(0x10, 0x3, 0x15) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-ssse3\x00'}, 0x58) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r2, &(0x7f0000000040), 0x1c) recvfrom$inet6(r2, 0x0, 0x0, 0xf0de7f, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="66fef8fcdbef28282265809e59071f67b9686e", 0x13) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb01001800000000160000d6000000d6000000030000000e0000000000000904000000070000000000000c010000000a0000000000000b0400000008000000020000854000000006000000050000003f0000000900000005000000010000000e00000000000001000000000c0003080c0000000000000100000000330047000500000000000002030000000e0000000200000f0200000002000000000000007b20000003000000ca0400000900000084a40800000003000085010001000000000001000000010000000b00000004000000040000000000000003000000ffff00000800000000000007000000000000006100"], &(0x7f0000000540)=""/255, 0xf3, 0xff, 0x1}, 0x20) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6803890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab3", 0x18}], 0x3}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) setsockopt$rose(r3, 0x104, 0x5, &(0x7f0000000000)=0x200, 0x4) sendmsg$nl_crypto(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0xe8}}, 0x0) 07:18:56 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 07:18:56 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0]) [ 171.993599][ T9311] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 07:18:56 executing program 2: syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0, @ANYBLOB]) 07:18:56 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0, @ANYBLOB=',dmask=000000']) [ 172.114461][ T9327] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 07:18:56 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 07:18:56 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 07:18:56 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0, @ANYBLOB=',dmask=000000']) 07:18:56 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 07:18:56 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 07:18:57 executing program 2: syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0, @ANYBLOB]) 07:18:57 executing program 0: r0 = gettid() r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r1, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r5, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r7, 0x6, 0x15, &(0x7f0000000100)=0x807, 0xfffffffffffffea7) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-ssse3\x00'}, 0x58) r8 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$sock(r5, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6803890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab3", 0x18}], 0x3}}, {{0x0, 0x0, 0x0, 0xffffffffffffff84}}], 0x2, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r8, 0x65, 0x5, &(0x7f0000000140), 0x4) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 07:18:57 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 07:18:57 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 07:18:57 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0, @ANYBLOB=',dmask=000000']) 07:18:57 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 07:18:57 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=']) 07:18:57 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0, @ANYBLOB]) 07:18:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000280012800b00010067656e6576658014000700fe8000000000000000000000000000bb"], 0x48}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmmsg(r0, &(0x7f00000002c0), 0x40000000000009f, 0x0) 07:18:57 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0, @ANYBLOB=',dmask=0000000?\x00\x00\x00\x00']) [ 172.889856][ T9402] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 07:18:57 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 07:18:57 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0, @ANYBLOB]) 07:18:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup3(r7, r8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$KVM_SET_FPU(r9, 0x41a0ae8d, &(0x7f0000000340)={[], 0xffff, 0x8001, 0x8, 0x0, 0x7ff, 0x5000, 0x1000, [], 0x8000}) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507000000000000000000000400", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xe, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x50, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xc, 0xd}}]}}}, @IFLA_LINK={0x8, 0x5, r6}]}, 0x50}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0xfeff, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x50, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x3}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1c, 0xb}}]}}}, @IFLA_LINK={0x8, 0x5, r6}]}, 0x50}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:18:57 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=']) 07:18:57 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0, @ANYBLOB=',dmask=000000']) [ 173.093004][ T9418] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 07:18:57 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0, @ANYBLOB]) 07:18:57 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 07:18:57 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=']) 07:18:57 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0, @ANYBLOB=',dmask=000000']) 07:18:57 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 07:18:58 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 173.410379][ T9429] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 07:18:58 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0]) 07:18:58 executing program 3: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 07:18:58 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0, @ANYBLOB=',dmask=000000']) 07:18:58 executing program 0: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0]) 07:18:58 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 07:18:58 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0]) 07:18:58 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0, @ANYBLOB=',dmask=0000000?\x00']) 07:18:58 executing program 3: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 07:18:58 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 07:18:58 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0]) 07:18:58 executing program 0: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=']) 07:18:58 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0, @ANYBLOB=',dmask=000000']) 07:18:58 executing program 0: prctl$PR_SVE_SET_VL(0x32, 0x157c7) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x5865, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="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"], 0x9c}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) [ 174.064102][ T9513] __ntfs_error: 48 callbacks suppressed [ 174.064111][ T9513] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 174.122027][ T9524] ntfs: (device loop4): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 174.133976][ T9523] ntfs: (device loop1): parse_options(): Unrecognized mount option 0x0000000000000000. [ 174.182816][ T9524] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 174.191864][ T9531] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 174.211363][ T9531] device vlan3 entered promiscuous mode [ 174.220045][ T9531] device bond_slave_0 entered promiscuous mode 07:18:58 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0]) 07:18:58 executing program 3: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 07:18:58 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRESHEX=0x0]) [ 174.232515][ T9531] device bond_slave_0 left promiscuous mode 07:18:58 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0, @ANYBLOB=',dmask=000000']) [ 174.402093][ T9543] ntfs: (device loop2): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 174.408665][ T9541] ntfs: (device loop1): parse_options(): Unrecognized mount option 0x0000000000000000. [ 174.461073][ T9543] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 174.510524][ T9551] ntfs: (device loop4): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. 07:18:59 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRESHEX=0x0]) 07:18:59 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0]) [ 174.627990][ T9551] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 07:18:59 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0, @ANYBLOB=',dmask=000000']) 07:18:59 executing program 3: setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 174.719163][ T9561] ntfs: (device loop1): parse_options(): Unrecognized mount option 0x0000000000000000. 07:18:59 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=']) 07:18:59 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRESHEX=0x0]) 07:18:59 executing program 0: prctl$PR_SVE_SET_VL(0x32, 0x157c7) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x5865, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="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"], 0x9c}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:18:59 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0, @ANYBLOB=',dmask=0000000?']) 07:18:59 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=']) 07:18:59 executing program 3: setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 175.000276][ T9588] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 07:18:59 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=0000000', @ANYRESHEX=0x0]) [ 175.047181][ T9588] device vlan3 entered promiscuous mode [ 175.053435][ T9588] device bond_slave_0 entered promiscuous mode [ 175.074263][ T9588] device bond_slave_0 left promiscuous mode 07:18:59 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=']) 07:18:59 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0, @ANYBLOB=',dmask=0000000']) 07:18:59 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=0000000', @ANYRESHEX=0x0]) 07:18:59 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0]) 07:19:00 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0, @ANYBLOB=',dmask=0000000']) 07:19:00 executing program 3: setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 07:19:00 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=0000000', @ANYRESHEX=0x0]) 07:19:00 executing program 0: prctl$PR_SVE_SET_VL(0x32, 0x157c7) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x5865, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="e1b49415642c249dc58c72d62e22b270c659ef95c90323e3a0d9d545edb46beece802952ef6bf6dd57e2811d714a1f1d89eec3bbef1c421e75ea77088cb6b11984850f741717abcdc2492e1cbb1157cbb33424d33e835196d4f132e006000000368e6e4fbb581bceca12f5e1c0eb72c4d2e0a00a1500e8bb450000dfecb638747262a08908e0f4ceb186bed84290dfe0e9c17df1e075b3a6e961a0b7794926301193a3368e1259b983920575da5ab5b08831b56818b9b3bd0238b0522900f13a9480fd64fe4dc2a1153bd376d1bec5ddb5d0fdbd820fb0637c6be548e7456632bbbdba881836b306acba4e43e24113faf494f975be9327b5eae6526a51366f83801675f4b8982bc6b0fd19062cd023abe028e9d0e0293d117cce9f01000000000000001b6579370f7fe0f0"], 0x9c}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:00 executing program 3: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 07:19:00 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0, @ANYBLOB=',dmask=0000000']) 07:19:00 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0]) [ 175.743861][ T9656] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 07:19:00 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x000000', @ANYRESHEX=0x0]) 07:19:00 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYBLOB=',dmask=0000000?']) [ 175.871246][ T9656] device vlan3 entered promiscuous mode [ 175.881856][ T9656] device bond_slave_0 entered promiscuous mode [ 175.892431][ T9656] device bond_slave_0 left promiscuous mode 07:19:00 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0]) 07:19:00 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x000000', @ANYRESHEX=0x0]) 07:19:00 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYBLOB=',dmask=0000000?']) 07:19:00 executing program 3: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 07:19:00 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRESHEX=0x0]) 07:19:00 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x000000', @ANYRESHEX=0x0]) 07:19:00 executing program 0: prctl$PR_SVE_SET_VL(0x32, 0x157c7) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x5865, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="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"], 0x9c}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:00 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYBLOB=',dmask=0000000?']) 07:19:00 executing program 3: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 07:19:00 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=000000', @ANYRESHEX=0x0]) 07:19:01 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRESHEX=0x0]) [ 176.434016][ T9715] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 176.496750][ T9715] device vlan3 entered promiscuous mode [ 176.502479][ T9715] device bond_slave_0 entered promiscuous mode [ 176.518207][ T9715] device bond_slave_0 left promiscuous mode 07:19:01 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0, @ANYBLOB=',dmask=0000000?']) 07:19:01 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=000000', @ANYRESHEX=0x0]) 07:19:01 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRESHEX=0x0]) 07:19:01 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=000000', @ANYRESHEX=0x0]) 07:19:01 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=0000000', @ANYRESHEX=0x0]) 07:19:01 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000', @ANYRESHEX=0x0]) 07:19:01 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0, @ANYBLOB=',dmask=0000000?']) 07:19:02 executing program 0: prctl$PR_SVE_SET_VL(0x32, 0x157c7) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x5865, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="e1b49415642c249dc58c72d62e22b270c659ef95c90323e3a0d9d545edb46beece802952ef6bf6dd57e2811d714a1f1d89eec3bbef1c421e75ea77088cb6b11984850f741717abcdc2492e1cbb1157cbb33424d33e835196d4f132e006000000368e6e4fbb581bceca12f5e1c0eb72c4d2e0a00a1500e8bb450000dfecb638747262a08908e0f4ceb186bed84290dfe0e9c17df1e075b3a6e961a0b7794926301193a3368e1259b983920575da5ab5b08831b56818b9b3bd0238b0522900f13a9480fd64fe4dc2a1153bd376d1bec5ddb5d0fdbd820fb0637c6be548e7456632bbbdba881836b306acba4e43e24113faf494f975be9327b5eae6526a51366f83801675f4b8982bc6b0fd19062cd023abe028e9d0e0293d117cce9f01000000000000001b6579370f7fe0f0"], 0x9c}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:02 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=0000000', @ANYRESHEX=0x0]) 07:19:02 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000', @ANYRESHEX=0x0]) 07:19:02 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0, @ANYBLOB=',dmask=0000000?']) 07:19:02 executing program 3: socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 07:19:02 executing program 0: prctl$PR_SVE_SET_VL(0x32, 0x157c7) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x5865, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="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"], 0x9c}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:02 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000', @ANYRESHEX=0x0]) 07:19:02 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=0000000', @ANYRESHEX=0x0]) 07:19:02 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0, @ANYBLOB=',dmask=0000000?']) 07:19:02 executing program 0: prctl$PR_SVE_SET_VL(0x32, 0x157c7) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x5865, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="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"], 0x9c}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:02 executing program 0: prctl$PR_SVE_SET_VL(0x32, 0x157c7) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x5865, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="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"], 0x9c}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r1, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:02 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000', @ANYRESHEX=0x0]) 07:19:02 executing program 3: socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 07:19:02 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x000000', @ANYRESHEX=0x0]) 07:19:02 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0, @ANYBLOB=',dmask=0000000?']) [ 178.054080][ T9829] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 07:19:02 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000', @ANYRESHEX=0x0]) [ 178.135789][ T9829] device vlan3 entered promiscuous mode 07:19:02 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x000000', @ANYRESHEX=0x0]) [ 178.233576][ T9829] device bond_slave_0 entered promiscuous mode 07:19:02 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0, @ANYBLOB=',dmask=0000000?']) [ 178.347022][ T9829] device bond_slave_0 left promiscuous mode 07:19:03 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x000000', @ANYRESHEX=0x0]) 07:19:03 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000', @ANYRESHEX=0x0]) 07:19:03 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0, @ANYBLOB=',dmask=0000000?']) 07:19:03 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=000000', @ANYRESHEX=0x0]) 07:19:03 executing program 0: prctl$PR_SVE_SET_VL(0x32, 0x157c7) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x5865, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="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"], 0x9c}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r1, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:03 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=000000', @ANYRESHEX=0x0]) 07:19:03 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,ui', @ANYRESHEX=0x0]) 07:19:03 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0, @ANYBLOB=',dmask=0000000?']) 07:19:03 executing program 3: socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 179.406930][ T9903] __ntfs_error: 54 callbacks suppressed [ 179.406949][ T9903] ntfs: (device loop2): parse_options(): Invalid dmask option argument: 0000000x0000000000000000 [ 179.435822][ T9908] ntfs: (device loop1): parse_options(): Unrecognized mount option ui0x0000000000000000. [ 179.443106][ T9907] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 07:19:04 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0, @ANYBLOB=',dmask=0000000?']) 07:19:04 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,ui', @ANYRESHEX=0x0]) [ 179.544062][ T9907] device vlan3 entered promiscuous mode [ 179.602262][ T9907] device bond_slave_0 entered promiscuous mode [ 179.627295][ T9907] device bond_slave_0 left promiscuous mode [ 179.665700][ T9925] ntfs: (device loop1): parse_options(): Unrecognized mount option ui0x0000000000000000. 07:19:04 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=000000', @ANYRESHEX=0x0]) 07:19:04 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0, @ANYBLOB=',dmask=0000000?']) 07:19:04 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,ui', @ANYRESHEX=0x0]) [ 179.879799][ T9932] ntfs: (device loop2): parse_options(): Invalid dmask option argument: 0000000x0000000000000000 07:19:04 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 07:19:04 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 179.994487][ T9943] ntfs: (device loop1): parse_options(): Unrecognized mount option ui0x0000000000000000. 07:19:04 executing program 0: prctl$PR_SVE_SET_VL(0x32, 0x157c7) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x5865, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="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"], 0x9c}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r1, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:04 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000', @ANYRESHEX=0x0]) [ 180.146651][ T9950] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 180.161155][ T9962] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 180.175736][ T9959] ntfs: (device loop2): parse_options(): Invalid dmask option argument: 000000000000000000x0000000000000000 07:19:04 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid', @ANYRESHEX=0x0]) [ 180.283007][ T9962] device vlan3 entered promiscuous mode 07:19:04 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 07:19:04 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 07:19:04 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000', @ANYRESHEX=0x0]) [ 180.326578][ T9962] device bond_slave_0 entered promiscuous mode [ 180.385430][ T9962] device bond_slave_0 left promiscuous mode [ 180.415195][ T9971] ntfs: (device loop1): parse_options(): Unrecognized mount option uid0x0000000000000000. [ 180.454417][ T9977] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 180.475799][ T9979] ntfs: (device loop2): parse_options(): Invalid dmask option argument: 000000000000000000x0000000000000000 07:19:05 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid', @ANYRESHEX=0x0]) 07:19:05 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 07:19:05 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000', @ANYRESHEX=0x0]) 07:19:05 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 07:19:05 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid', @ANYRESHEX=0x0]) 07:19:05 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0]) 07:19:05 executing program 0: prctl$PR_SVE_SET_VL(0x32, 0x157c7) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x5865, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="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"], 0x9c}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r0, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:05 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000', @ANYRESHEX=0x0]) 07:19:05 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0]) 07:19:05 executing program 1 (fault-call:0 fault-nth:0): syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0]) 07:19:05 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100), 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 181.175433][T10035] FAULT_INJECTION: forcing a failure. [ 181.175433][T10035] name failslab, interval 1, probability 0, space 0, times 1 [ 181.194596][T10035] CPU: 1 PID: 10035 Comm: syz-executor.1 Not tainted 5.6.0-rc7-syzkaller #0 [ 181.203304][T10035] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 181.213367][T10035] Call Trace: [ 181.216675][T10035] dump_stack+0x1e9/0x30e [ 181.221039][T10035] should_fail+0x433/0x5b0 [ 181.225507][T10035] ? __se_sys_memfd_create+0xfb/0x480 [ 181.230883][T10035] should_failslab+0x5/0x20 [ 181.235388][T10035] __kmalloc+0x74/0x330 [ 181.239557][T10035] ? strnlen_user+0x206/0x2c0 [ 181.244242][T10035] __se_sys_memfd_create+0xfb/0x480 [ 181.249471][T10035] do_syscall_64+0xf3/0x1b0 [ 181.253999][T10035] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 181.259891][T10035] RIP: 0033:0x45c849 [ 181.260619][T10038] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 181.263777][T10035] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 181.263784][T10035] RSP: 002b:00007fa39971ea68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 181.263798][T10035] RAX: ffffffffffffffda RBX: 00007fa39971f6d4 RCX: 000000000045c849 [ 181.263804][T10035] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1941 [ 181.263809][T10035] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000001 07:19:05 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100), 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 181.263820][T10035] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 181.323168][T10038] device vlan3 entered promiscuous mode [ 181.323755][T10035] R13: 0000000000000be7 R14: 00000000004ce08e R15: 0000000000000000 07:19:05 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000', @ANYRESHEX=0x0]) 07:19:05 executing program 1 (fault-call:0 fault-nth:1): syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0]) [ 181.376181][T10038] device bond_slave_0 entered promiscuous mode [ 181.404357][T10038] device bond_slave_0 left promiscuous mode 07:19:06 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0]) [ 181.492312][T10052] FAULT_INJECTION: forcing a failure. [ 181.492312][T10052] name failslab, interval 1, probability 0, space 0, times 0 [ 181.549739][T10052] CPU: 1 PID: 10052 Comm: syz-executor.1 Not tainted 5.6.0-rc7-syzkaller #0 [ 181.558456][T10052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 181.568521][T10052] Call Trace: [ 181.571831][T10052] dump_stack+0x1e9/0x30e [ 181.576184][T10052] should_fail+0x433/0x5b0 [ 181.580624][T10052] ? shmem_alloc_inode+0x17/0x40 [ 181.585566][T10052] should_failslab+0x5/0x20 [ 181.590080][T10052] kmem_cache_alloc+0x53/0x2d0 [ 181.594854][T10052] ? shmem_match+0x150/0x150 [ 181.599454][T10052] shmem_alloc_inode+0x17/0x40 [ 181.604223][T10052] ? shmem_match+0x150/0x150 [ 181.608837][T10052] new_inode_pseudo+0x64/0x240 [ 181.613622][T10052] new_inode+0x25/0x1d0 [ 181.617790][T10052] shmem_get_inode+0x10e/0x6f0 [ 181.622558][T10052] ? __alloc_fd+0x566/0x600 [ 181.627075][T10052] __shmem_file_setup+0x11e/0x270 [ 181.632108][T10052] __se_sys_memfd_create+0x25e/0x480 [ 181.637409][T10052] do_syscall_64+0xf3/0x1b0 [ 181.641921][T10052] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 181.647812][T10052] RIP: 0033:0x45c849 [ 181.651706][T10052] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 181.671312][T10052] RSP: 002b:00007fa39971ea68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 181.679757][T10052] RAX: ffffffffffffffda RBX: 00007fa39971f6d4 RCX: 000000000045c849 [ 181.687735][T10052] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1941 [ 181.695712][T10052] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000001 [ 181.703695][T10052] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 181.711674][T10052] R13: 0000000000000be7 R14: 00000000004ce08e R15: 0000000000000001 07:19:06 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000', @ANYRESHEX=0x0]) 07:19:06 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0, @ANYBLOB]) 07:19:06 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,ui', @ANYRESHEX=0x0]) 07:19:07 executing program 0: prctl$PR_SVE_SET_VL(0x32, 0x157c7) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x5865, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="033d0000000000006800120009000100766c616e00000000580002000c00020002000000020000000600010000000000400003000c00010020000000050000000c00010008000000010000800c00010002000000070000000c000100b0000000200000000c00010020000000030000000a000500220000000000000008000a00393d7f2a886f5e0c07929ebacfeebcd68d585ca42013280f666dcd8dbf765432d95db7f7bf5f646c6f16921b8ec95cdae9e1728c2592802e1e2699ff9c66360f8e9fc398b83641d023b2dc0f48a746e9f600fd1a296a6df9b99e7bffae330f3abc295b1eba4b2c9a79021e32b2bde641522ebf4beb3c950c1b719c46df536624981dfd", @ANYRES32=0x0, @ANYBLOB="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"], 0x9c}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r0, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:07 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0, @ANYBLOB]) 07:19:07 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,ui', @ANYRESHEX=0x0]) 07:19:07 executing program 1 (fault-call:0 fault-nth:2): syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0]) 07:19:07 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100), 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 182.516192][T10092] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 182.554152][T10096] FAULT_INJECTION: forcing a failure. 07:19:07 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0, @ANYBLOB]) [ 182.554152][T10096] name failslab, interval 1, probability 0, space 0, times 0 [ 182.608217][T10092] device vlan3 entered promiscuous mode [ 182.620195][T10092] device bond_slave_0 entered promiscuous mode [ 182.631953][T10096] CPU: 0 PID: 10096 Comm: syz-executor.1 Not tainted 5.6.0-rc7-syzkaller #0 [ 182.640650][T10096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 182.650706][T10096] Call Trace: [ 182.654020][T10096] dump_stack+0x1e9/0x30e [ 182.658373][T10096] should_fail+0x433/0x5b0 [ 182.662808][T10096] ? security_inode_alloc+0x32/0x1e0 [ 182.668097][T10096] should_failslab+0x5/0x20 [ 182.672602][T10096] kmem_cache_alloc+0x53/0x2d0 [ 182.677367][T10096] ? shmem_alloc_inode+0x17/0x40 [ 182.682313][T10096] security_inode_alloc+0x32/0x1e0 [ 182.687434][T10096] inode_init_always+0x3be/0x900 [ 182.692375][T10096] ? shmem_match+0x150/0x150 [ 182.696973][T10096] new_inode_pseudo+0x7b/0x240 [ 182.701740][T10096] new_inode+0x25/0x1d0 [ 182.705901][T10096] shmem_get_inode+0x10e/0x6f0 [ 182.710667][T10096] ? __alloc_fd+0x566/0x600 [ 182.715177][T10096] __shmem_file_setup+0x11e/0x270 [ 182.720207][T10096] __se_sys_memfd_create+0x25e/0x480 [ 182.725499][T10096] do_syscall_64+0xf3/0x1b0 [ 182.730008][T10096] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 182.735905][T10096] RIP: 0033:0x45c849 [ 182.739801][T10096] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 182.759408][T10096] RSP: 002b:00007fa39971ea68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 182.767828][T10096] RAX: ffffffffffffffda RBX: 00007fa39971f6d4 RCX: 000000000045c849 [ 182.775807][T10096] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1941 [ 182.783783][T10096] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000001 [ 182.791762][T10096] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 182.799825][T10096] R13: 0000000000000be7 R14: 00000000004ce08e R15: 0000000000000002 07:19:07 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,ui', @ANYRESHEX=0x0]) [ 182.816310][T10092] device bond_slave_0 left promiscuous mode 07:19:07 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0, @ANYBLOB=',dmask=0']) 07:19:07 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid', @ANYRESHEX=0x0]) 07:19:07 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0, @ANYBLOB=',']) 07:19:07 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid', @ANYRESHEX=0x0]) 07:19:07 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0, @ANYBLOB]) 07:19:08 executing program 0: prctl$PR_SVE_SET_VL(0x32, 0x157c7) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x5865, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="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"], 0x9c}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r0, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:08 executing program 1 (fault-call:0 fault-nth:3): syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0]) 07:19:08 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 07:19:08 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid', @ANYRESHEX=0x0]) 07:19:08 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0, @ANYBLOB]) [ 183.504985][T10156] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 183.516739][T10157] FAULT_INJECTION: forcing a failure. [ 183.516739][T10157] name failslab, interval 1, probability 0, space 0, times 0 [ 183.533859][T10156] device vlan3 entered promiscuous mode [ 183.542478][T10157] CPU: 0 PID: 10157 Comm: syz-executor.1 Not tainted 5.6.0-rc7-syzkaller #0 [ 183.551167][T10157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 183.561226][T10157] Call Trace: [ 183.564525][T10157] dump_stack+0x1e9/0x30e [ 183.568869][T10157] should_fail+0x433/0x5b0 [ 183.573292][T10157] ? __d_alloc+0x2a/0x6d0 [ 183.577624][T10157] should_failslab+0x5/0x20 [ 183.582128][T10157] kmem_cache_alloc+0x53/0x2d0 [ 183.586898][T10157] ? read_seqcount_begin+0x177/0x1c0 [ 183.592189][T10157] __d_alloc+0x2a/0x6d0 [ 183.596346][T10157] ? lockdep_init_map+0x26/0x670 [ 183.601423][T10157] d_alloc_pseudo+0x19/0x70 [ 183.605930][T10157] alloc_file_pseudo+0xc8/0x240 [ 183.610898][T10157] __shmem_file_setup+0x194/0x270 [ 183.615964][T10157] __se_sys_memfd_create+0x25e/0x480 [ 183.621259][T10157] do_syscall_64+0xf3/0x1b0 [ 183.625772][T10157] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 183.631666][T10157] RIP: 0033:0x45c849 [ 183.635560][T10157] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 183.655298][T10157] RSP: 002b:00007fa39971ea68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 183.663732][T10157] RAX: ffffffffffffffda RBX: 00007fa39971f6d4 RCX: 000000000045c849 [ 183.671709][T10157] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1941 [ 183.679689][T10157] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000001 [ 183.687753][T10157] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 183.695728][T10157] R13: 0000000000000be7 R14: 00000000004ce08e R15: 0000000000000003 [ 183.709862][T10156] device bond_slave_0 entered promiscuous mode 07:19:08 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0, @ANYBLOB]) 07:19:08 executing program 1 (fault-call:0 fault-nth:4): syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0]) [ 183.762283][T10156] device bond_slave_0 left promiscuous mode [ 183.867873][T10174] FAULT_INJECTION: forcing a failure. [ 183.867873][T10174] name failslab, interval 1, probability 0, space 0, times 0 [ 183.881938][T10174] CPU: 1 PID: 10174 Comm: syz-executor.1 Not tainted 5.6.0-rc7-syzkaller #0 [ 183.890627][T10174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 183.900843][T10174] Call Trace: [ 183.904147][T10174] dump_stack+0x1e9/0x30e [ 183.908488][T10174] should_fail+0x433/0x5b0 [ 183.912922][T10174] ? __alloc_file+0x26/0x380 [ 183.917511][T10174] should_failslab+0x5/0x20 [ 183.922017][T10174] kmem_cache_alloc+0x53/0x2d0 [ 183.926793][T10174] __alloc_file+0x26/0x380 [ 183.931212][T10174] ? alloc_empty_file+0x47/0x1b0 [ 183.936152][T10174] alloc_empty_file+0xa7/0x1b0 [ 183.940917][T10174] alloc_file+0x5d/0x4b0 [ 183.945161][T10174] alloc_file_pseudo+0x1b0/0x240 [ 183.950114][T10174] __shmem_file_setup+0x194/0x270 [ 183.955142][T10174] __se_sys_memfd_create+0x25e/0x480 [ 183.960434][T10174] do_syscall_64+0xf3/0x1b0 [ 183.964948][T10174] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 183.970847][T10174] RIP: 0033:0x45c849 [ 183.974747][T10174] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 183.994355][T10174] RSP: 002b:00007fa39971ea68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 184.002775][T10174] RAX: ffffffffffffffda RBX: 00007fa39971f6d4 RCX: 000000000045c849 [ 184.010756][T10174] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1941 [ 184.018738][T10174] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000001 [ 184.026718][T10174] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 184.034693][T10174] R13: 0000000000000be7 R14: 00000000004ce08e R15: 0000000000000004 07:19:08 executing program 1 (fault-call:0 fault-nth:5): syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0]) 07:19:08 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB=',']) 07:19:08 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0, @ANYBLOB=',dmask=0']) [ 184.177728][T10181] FAULT_INJECTION: forcing a failure. [ 184.177728][T10181] name failslab, interval 1, probability 0, space 0, times 0 [ 184.212201][T10181] CPU: 1 PID: 10181 Comm: syz-executor.1 Not tainted 5.6.0-rc7-syzkaller #0 [ 184.220916][T10181] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 184.231151][T10181] Call Trace: [ 184.234449][T10181] dump_stack+0x1e9/0x30e [ 184.238815][T10181] should_fail+0x433/0x5b0 [ 184.243249][T10181] ? security_file_alloc+0x32/0x200 [ 184.248451][T10181] should_failslab+0x5/0x20 [ 184.252969][T10181] kmem_cache_alloc+0x53/0x2d0 [ 184.257754][T10181] security_file_alloc+0x32/0x200 [ 184.262792][T10181] __alloc_file+0xd7/0x380 [ 184.267374][T10181] alloc_empty_file+0xa7/0x1b0 [ 184.272156][T10181] alloc_file+0x5d/0x4b0 [ 184.276419][T10181] alloc_file_pseudo+0x1b0/0x240 [ 184.281380][T10181] __shmem_file_setup+0x194/0x270 [ 184.286420][T10181] __se_sys_memfd_create+0x25e/0x480 [ 184.291719][T10181] do_syscall_64+0xf3/0x1b0 [ 184.296236][T10181] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 184.302129][T10181] RIP: 0033:0x45c849 [ 184.306023][T10181] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 184.325632][T10181] RSP: 002b:00007fa39971ea68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 184.334052][T10181] RAX: ffffffffffffffda RBX: 00007fa39971f6d4 RCX: 000000000045c849 [ 184.342032][T10181] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1941 [ 184.350016][T10181] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000001 [ 184.358082][T10181] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 184.366153][T10181] R13: 0000000000000be7 R14: 00000000004ce08e R15: 0000000000000005 07:19:09 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0, @ANYBLOB=',dmask=0']) 07:19:09 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB]) [ 184.548047][T10196] __ntfs_error: 28 callbacks suppressed [ 184.548056][T10196] ntfs: (device loop2): parse_options(): Unrecognized mount option 0x0000000000000000. 07:19:09 executing program 0: prctl$PR_SVE_SET_VL(0x32, 0x157c7) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x5865, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="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"], 0x9c}}, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r1, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:09 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 07:19:09 executing program 1 (fault-call:0 fault-nth:6): syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0]) [ 184.592760][T10198] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 184.628183][T10206] FAULT_INJECTION: forcing a failure. [ 184.628183][T10206] name failslab, interval 1, probability 0, space 0, times 0 07:19:09 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0, @ANYBLOB=',dmask=0']) [ 184.658338][T10208] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 184.671261][T10206] CPU: 0 PID: 10206 Comm: syz-executor.1 Not tainted 5.6.0-rc7-syzkaller #0 [ 184.679952][T10206] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 184.690034][T10206] Call Trace: [ 184.693335][T10206] dump_stack+0x1e9/0x30e [ 184.697680][T10206] should_fail+0x433/0x5b0 [ 184.702116][T10206] ? tomoyo_realpath_from_path+0xd8/0x630 [ 184.707964][T10206] should_failslab+0x5/0x20 [ 184.712465][T10206] __kmalloc+0x74/0x330 [ 184.716629][T10206] ? tomoyo_realpath_from_path+0xcb/0x630 [ 184.722468][T10206] tomoyo_realpath_from_path+0xd8/0x630 [ 184.728017][T10206] ? rcu_lock_acquire+0x5/0x30 [ 184.732899][T10206] tomoyo_path_perm+0x17d/0x740 [ 184.737797][T10206] security_path_truncate+0xc0/0x140 [ 184.743085][T10206] do_sys_ftruncate+0x43a/0x680 [ 184.747976][T10206] ? trace_irq_disable_rcuidle+0x1f/0x1d0 [ 184.753702][T10206] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 184.759789][T10206] do_syscall_64+0xf3/0x1b0 [ 184.764312][T10206] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 184.770213][T10206] RIP: 0033:0x45c817 [ 184.774107][T10206] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 184.793810][T10206] RSP: 002b:00007fa39971ea68 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 184.802495][T10206] RAX: ffffffffffffffda RBX: 00007fa39971f6d4 RCX: 000000000045c817 [ 184.810475][T10206] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 184.818452][T10206] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000001 [ 184.826425][T10206] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000003 [ 184.834400][T10206] R13: 0000000000000be7 R14: 00000000004ce08e R15: 0000000000000006 07:19:09 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 184.857754][T10206] ERROR: Out of memory at tomoyo_realpath_from_path. [ 184.878949][T10208] device vlan3 entered promiscuous mode [ 184.894381][T10208] device bond_slave_0 entered promiscuous mode 07:19:09 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB]) [ 184.899452][T10206] ntfs: (device loop1): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 184.911346][T10208] device bond_slave_0 left promiscuous mode [ 184.933063][T10206] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 184.947685][T10218] ntfs: (device loop2): parse_options(): Unrecognized mount option 0x0000000000000000. 07:19:09 executing program 1 (fault-call:0 fault-nth:7): syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0]) [ 185.063609][T10224] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 185.119499][T10230] FAULT_INJECTION: forcing a failure. [ 185.119499][T10230] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 185.132753][T10230] CPU: 1 PID: 10230 Comm: syz-executor.1 Not tainted 5.6.0-rc7-syzkaller #0 [ 185.141513][T10230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 185.151575][T10230] Call Trace: [ 185.154882][T10230] dump_stack+0x1e9/0x30e [ 185.159225][T10230] should_fail+0x433/0x5b0 [ 185.163657][T10230] prepare_alloc_pages+0x28c/0x4a0 [ 185.168785][T10230] __alloc_pages_nodemask+0xbf/0x600 [ 185.174088][T10230] kmem_getpages+0x49/0x930 [ 185.178604][T10230] cache_grow_begin+0x7b/0x2e0 [ 185.183379][T10230] cache_alloc_refill+0x346/0x3e0 [ 185.188410][T10230] ? trace_irq_disable_rcuidle+0x1f/0x1d0 [ 185.194130][T10230] ? check_preemption_disabled+0xb0/0x240 [ 185.199849][T10230] ? debug_smp_processor_id+0x5/0x20 [ 185.205141][T10230] __kmalloc+0x30c/0x330 [ 185.209385][T10230] ? tomoyo_realpath_from_path+0xd8/0x630 [ 185.215106][T10230] tomoyo_realpath_from_path+0xd8/0x630 [ 185.220654][T10230] ? rcu_lock_acquire+0x5/0x30 [ 185.225440][T10230] tomoyo_path_perm+0x17d/0x740 [ 185.230339][T10230] security_path_truncate+0xc0/0x140 [ 185.235661][T10230] do_sys_ftruncate+0x43a/0x680 [ 185.240525][T10230] ? trace_irq_disable_rcuidle+0x1f/0x1d0 [ 185.246245][T10230] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 185.252324][T10230] do_syscall_64+0xf3/0x1b0 [ 185.256834][T10230] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 185.262725][T10230] RIP: 0033:0x45c817 [ 185.266616][T10230] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 185.286236][T10230] RSP: 002b:00007fa39971ea68 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 185.294649][T10230] RAX: ffffffffffffffda RBX: 00007fa39971f6d4 RCX: 000000000045c817 [ 185.302623][T10230] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 185.310592][T10230] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000001 07:19:09 executing program 2: syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0, @ANYBLOB=',dmask=0']) [ 185.318565][T10230] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000003 [ 185.326545][T10230] R13: 0000000000000be7 R14: 00000000004ce08e R15: 0000000000000007 07:19:10 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB]) 07:19:10 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 07:19:10 executing program 2: syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0, @ANYBLOB=',dmask=0']) [ 185.507549][T10244] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 07:19:10 executing program 4 (fault-call:0 fault-nth:0): syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB=',']) 07:19:10 executing program 0: prctl$PR_SVE_SET_VL(0x32, 0x157c7) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x5865, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="e1b49415642c249dc58c72d62e22b270c659ef95c90323e3a0d9d545edb46beece802952ef6bf6dd57e2811d714a1f1d89eec3bbef1c421e75ea77088cb6b11984850f741717abcdc2492e1cbb1157cbb33424d33e835196d4f132e006000000368e6e4fbb581bceca12f5e1c0eb72c4d2e0a00a1500e8bb450000dfecb638747262a08908e0f4ceb186bed84290dfe0e9c17df1e075b3a6e961a0b7794926301193a3368e1259b983920575da5ab5b08831b56818b9b3bd0238b0522900f13a9480fd64fe4dc2a1153bd376d1bec5ddb5d0fdbd820fb0637c6be548e7456632bbbdba881836b306acba4e43e24113faf494f975be9327b5eae6526a51366f83801675f4b8982bc6b0fd19062cd023abe028e9d0e0293d117cce9f01000000000000001b6579370f7fe0f0"], 0x9c}}, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r1, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:10 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 185.675181][T10260] FAULT_INJECTION: forcing a failure. [ 185.675181][T10260] name failslab, interval 1, probability 0, space 0, times 0 [ 185.713758][T10265] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 185.722796][T10260] CPU: 1 PID: 10260 Comm: syz-executor.4 Not tainted 5.6.0-rc7-syzkaller #0 [ 185.731617][T10260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 185.741679][T10260] Call Trace: [ 185.744988][T10260] dump_stack+0x1e9/0x30e [ 185.749357][T10260] should_fail+0x433/0x5b0 [ 185.753805][T10260] ? __se_sys_memfd_create+0xfb/0x480 [ 185.759180][T10260] should_failslab+0x5/0x20 [ 185.763686][T10260] __kmalloc+0x74/0x330 [ 185.767850][T10260] ? strnlen_user+0x206/0x2c0 [ 185.772540][T10260] __se_sys_memfd_create+0xfb/0x480 [ 185.777754][T10260] do_syscall_64+0xf3/0x1b0 [ 185.782262][T10260] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 185.788150][T10260] RIP: 0033:0x45c849 [ 185.792042][T10260] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 185.811648][T10260] RSP: 002b:00007f03bb555a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 185.820065][T10260] RAX: ffffffffffffffda RBX: 00007f03bb5566d4 RCX: 000000000045c849 [ 185.828042][T10260] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1941 [ 185.836018][T10260] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000001 [ 185.843986][T10260] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 185.851956][T10260] R13: 0000000000000be7 R14: 00000000004ce08e R15: 0000000000000000 07:19:10 executing program 2: syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0, @ANYBLOB=',dmask=0']) [ 185.875115][T10265] device vlan3 entered promiscuous mode 07:19:10 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 185.914293][T10265] device bond_slave_0 entered promiscuous mode 07:19:10 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0]) 07:19:10 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0, @ANYBLOB=',dmask=0']) [ 185.972953][T10265] device bond_slave_0 left promiscuous mode [ 186.058104][T10280] ntfs: (device loop1): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 186.083504][T10280] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 07:19:10 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0, @ANYBLOB=',dmask=0']) 07:19:10 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0]) 07:19:10 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0, @ANYBLOB=',dmask=0']) [ 186.298380][T10298] ntfs: (device loop1): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. 07:19:11 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 07:19:11 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0]) 07:19:11 executing program 4 (fault-call:0 fault-nth:1): syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB=',']) [ 186.626981][T10323] FAULT_INJECTION: forcing a failure. [ 186.626981][T10323] name failslab, interval 1, probability 0, space 0, times 0 [ 186.641441][T10323] CPU: 0 PID: 10323 Comm: syz-executor.4 Not tainted 5.6.0-rc7-syzkaller #0 [ 186.650255][T10323] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 186.660311][T10323] Call Trace: [ 186.663630][T10323] dump_stack+0x1e9/0x30e [ 186.667981][T10323] should_fail+0x433/0x5b0 [ 186.672415][T10323] ? shmem_alloc_inode+0x17/0x40 [ 186.677357][T10323] should_failslab+0x5/0x20 [ 186.681863][T10323] kmem_cache_alloc+0x53/0x2d0 [ 186.686717][T10323] ? shmem_match+0x150/0x150 [ 186.691314][T10323] shmem_alloc_inode+0x17/0x40 [ 186.696106][T10323] ? shmem_match+0x150/0x150 [ 186.700691][T10323] new_inode_pseudo+0x64/0x240 [ 186.705465][T10323] new_inode+0x25/0x1d0 [ 186.709661][T10323] shmem_get_inode+0x10e/0x6f0 [ 186.714431][T10323] ? __alloc_fd+0x566/0x600 [ 186.718941][T10323] __shmem_file_setup+0x11e/0x270 [ 186.723975][T10323] __se_sys_memfd_create+0x25e/0x480 [ 186.729268][T10323] do_syscall_64+0xf3/0x1b0 [ 186.733783][T10323] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 186.739679][T10323] RIP: 0033:0x45c849 [ 186.743569][T10323] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 186.763176][T10323] RSP: 002b:00007f03bb555a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 186.771596][T10323] RAX: ffffffffffffffda RBX: 00007f03bb5566d4 RCX: 000000000045c849 [ 186.779575][T10323] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1941 [ 186.787557][T10323] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000001 [ 186.795666][T10323] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 186.803643][T10323] R13: 0000000000000be7 R14: 00000000004ce08e R15: 0000000000000001 07:19:11 executing program 0: prctl$PR_SVE_SET_VL(0x32, 0x157c7) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x5865, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="033d0000000000006800120009000100766c616e00000000580002000c00020002000000020000000600010000000000400003000c00010020000000050000000c00010008000000010000800c00010002000000070000000c000100b0000000200000000c00010020000000030000000a000500220000000000000008000a00393d7f2a886f5e0c07929ebacfeebcd68d585ca42013280f666dcd8dbf765432d95db7f7bf5f646c6f16921b8ec95cdae9e1728c2592802e1e2699ff9c66360f8e9fc398b83641d023b2dc0f48a746e9f600fd1a296a6df9b99e7bffae330f3abc295b1eba4b2c9a79021e32b2bde641522ebf4beb3c950c1b719c46df536624981dfd", @ANYRES32=0x0, @ANYBLOB="e1b49415642c249dc58c72d62e22b270c659ef95c90323e3a0d9d545edb46beece802952ef6bf6dd57e2811d714a1f1d89eec3bbef1c421e75ea77088cb6b11984850f741717abcdc2492e1cbb1157cbb33424d33e835196d4f132e006000000368e6e4fbb581bceca12f5e1c0eb72c4d2e0a00a1500e8bb450000dfecb638747262a08908e0f4ceb186bed84290dfe0e9c17df1e075b3a6e961a0b7794926301193a3368e1259b983920575da5ab5b08831b56818b9b3bd0238b0522900f13a9480fd64fe4dc2a1153bd376d1bec5ddb5d0fdbd820fb0637c6be548e7456632bbbdba881836b306acba4e43e24113faf494f975be9327b5eae6526a51366f83801675f4b8982bc6b0fd19062cd023abe028e9d0e0293d117cce9f01000000000000001b6579370f7fe0f0"], 0x9c}}, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r1, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:11 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 07:19:11 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 07:19:11 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x4, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0]) [ 186.998778][T10335] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 07:19:11 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 187.045275][T10335] device vlan3 entered promiscuous mode [ 187.068437][T10335] device bond_slave_0 entered promiscuous mode 07:19:11 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x5, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0]) [ 187.114547][T10335] device bond_slave_0 left promiscuous mode 07:19:11 executing program 4 (fault-call:0 fault-nth:2): syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB=',']) 07:19:11 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x6, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0]) 07:19:11 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0]) [ 187.396759][T10363] FAULT_INJECTION: forcing a failure. [ 187.396759][T10363] name failslab, interval 1, probability 0, space 0, times 0 [ 187.460404][T10363] CPU: 0 PID: 10363 Comm: syz-executor.4 Not tainted 5.6.0-rc7-syzkaller #0 [ 187.469127][T10363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 187.479326][T10363] Call Trace: [ 187.482636][T10363] dump_stack+0x1e9/0x30e [ 187.490461][T10363] should_fail+0x433/0x5b0 [ 187.495068][T10363] ? security_inode_alloc+0x32/0x1e0 [ 187.500363][T10363] should_failslab+0x5/0x20 [ 187.504875][T10363] kmem_cache_alloc+0x53/0x2d0 [ 187.509652][T10363] ? shmem_alloc_inode+0x17/0x40 [ 187.514607][T10363] security_inode_alloc+0x32/0x1e0 [ 187.519734][T10363] inode_init_always+0x3be/0x900 [ 187.524683][T10363] ? shmem_match+0x150/0x150 [ 187.529281][T10363] new_inode_pseudo+0x7b/0x240 [ 187.534047][T10363] new_inode+0x25/0x1d0 [ 187.538216][T10363] shmem_get_inode+0x10e/0x6f0 [ 187.542989][T10363] ? __alloc_fd+0x566/0x600 [ 187.547506][T10363] __shmem_file_setup+0x11e/0x270 [ 187.552540][T10363] __se_sys_memfd_create+0x25e/0x480 [ 187.557832][T10363] do_syscall_64+0xf3/0x1b0 [ 187.562344][T10363] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 187.568236][T10363] RIP: 0033:0x45c849 [ 187.572132][T10363] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 187.591745][T10363] RSP: 002b:00007f03bb555a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 187.600169][T10363] RAX: ffffffffffffffda RBX: 00007f03bb5566d4 RCX: 000000000045c849 07:19:12 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0]) [ 187.608271][T10363] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1941 [ 187.616254][T10363] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000001 [ 187.624236][T10363] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 187.632219][T10363] R13: 0000000000000be7 R14: 00000000004ce08e R15: 0000000000000002 07:19:12 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 07:19:12 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x7, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0]) 07:19:12 executing program 0: prctl$PR_SVE_SET_VL(0x32, 0x157c7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:12 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0]) 07:19:12 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 07:19:12 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x8, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0]) 07:19:12 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 07:19:12 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0, @ANYBLOB]) 07:19:13 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB=',']) 07:19:13 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 07:19:13 executing program 0: prctl$PR_SVE_SET_VL(0x32, 0x157c7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:13 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x9, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0]) 07:19:13 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0, @ANYBLOB]) 07:19:13 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 07:19:13 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB=',']) 07:19:13 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0, @ANYBLOB]) 07:19:13 executing program 0: prctl$PR_SVE_SET_VL(0x32, 0x157c7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:13 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0xa, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0]) 07:19:13 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x0, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 07:19:13 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0, @ANYBLOB=',dma']) 07:19:13 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x5865, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="033d0000000000006800120009000100766c616e00000000580002000c00020002000000020000000600010000000000400003000c00010020000000050000000c00010008000000010000800c00010002000000070000000c000100b0000000200000000c00010020000000030000000a000500220000000000000008000a00393d7f2a886f5e0c07929ebacfeebcd68d585ca42013280f666dcd8dbf765432d95db7f7bf5f646c6f16921b8ec95cdae9e1728c2592802e1e2699ff9c66360f8e9fc398b83641d023b2dc0f48a746e9f600fd1a296a6df9b99e7bffae330f3abc295b1eba4b2c9a79021e32b2bde641522ebf4beb3c950c1b719c46df536624981dfd", @ANYRES32=0x0, @ANYBLOB="e1b49415642c249dc58c72d62e22b270c659ef95c90323e3a0d9d545edb46beece802952ef6bf6dd57e2811d714a1f1d89eec3bbef1c421e75ea77088cb6b11984850f741717abcdc2492e1cbb1157cbb33424d33e835196d4f132e006000000368e6e4fbb581bceca12f5e1c0eb72c4d2e0a00a1500e8bb450000dfecb638747262a08908e0f4ceb186bed84290dfe0e9c17df1e075b3a6e961a0b7794926301193a3368e1259b983920575da5ab5b08831b56818b9b3bd0238b0522900f13a9480fd64fe4dc2a1153bd376d1bec5ddb5d0fdbd820fb0637c6be548e7456632bbbdba881836b306acba4e43e24113faf494f975be9327b5eae6526a51366f83801675f4b8982bc6b0fd19062cd023abe028e9d0e0293d117cce9f01000000000000001b6579370f7fe0f0"], 0x9c}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:13 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB=',']) 07:19:13 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x0, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 189.012011][T10481] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 189.041390][T10481] device vlan3 entered promiscuous mode [ 189.055314][T10481] device bond_slave_0 entered promiscuous mode 07:19:13 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0xb, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0]) [ 189.110389][T10481] device bond_slave_0 left promiscuous mode 07:19:13 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0, @ANYBLOB=',dma']) 07:19:13 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x4, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB=',']) 07:19:14 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0xc, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0]) 07:19:14 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x0, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 07:19:14 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0, @ANYBLOB=',dma']) [ 189.579391][T10530] __ntfs_error: 62 callbacks suppressed [ 189.579399][T10530] ntfs: (device loop2): parse_options(): Unrecognized mount option 0x0000000000000000. [ 189.594747][ C0] [ 189.594751][ C0] ===================================== [ 189.594753][ C0] WARNING: bad unlock balance detected! [ 189.594758][ C0] 5.6.0-rc7-syzkaller #0 Not tainted [ 189.594760][ C0] ------------------------------------- [ 189.594763][ C0] syz-executor.2/10530 is trying to release lock (rcu_callback) at: [ 189.594778][ C0] [] rcu_lock_release+0x0/0x20 [ 189.594780][ C0] but there are no more locks to release! [ 189.594787][ C0] [ 189.594787][ C0] other info that might help us debug this: [ 189.594794][ C0] 1 lock held by syz-executor.2/10530: [ 189.594799][ C0] #0: ffff888043dc80d8 (&type->s_umount_key#54/1){+.+.}, at: alloc_super+0x160/0x760 [ 189.594843][ C0] [ 189.594843][ C0] stack backtrace: [ 189.594852][ C0] CPU: 0 PID: 10530 Comm: syz-executor.2 Not tainted 5.6.0-rc7-syzkaller #0 [ 189.594858][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 189.594863][ C0] Call Trace: [ 189.594869][ C0] [ 189.594879][ C0] dump_stack+0x1e9/0x30e [ 189.594888][ C0] ? rcu_lock_acquire+0x30/0x30 [ 189.594899][ C0] print_unlock_imbalance_bug+0x20b/0x240 [ 189.594908][ C0] ? do_raw_spin_unlock+0x134/0x8d0 [ 189.594919][ C0] ? __bitmap_andnot+0x316/0x330 [ 189.594934][ C0] lock_release+0x37c/0x720 [ 189.594943][ C0] ? rcu_lock_acquire+0x30/0x30 [ 189.594951][ C0] ? zap_class+0xd30/0xd30 [ 189.594959][ C0] rcu_core+0x7f0/0x1080 [ 189.594972][ C0] __do_softirq+0x268/0x7c5 [ 189.594982][ C0] ? irq_exit+0x223/0x230 [ 189.594991][ C0] irq_exit+0x223/0x230 [ 189.594998][ C0] smp_apic_timer_interrupt+0x113/0x280 [ 189.595005][ C0] apic_timer_interrupt+0xf/0x20 [ 189.595008][ C0] [ 189.595015][ C0] RIP: 0010:console_unlock+0xa25/0xec0 [ 189.595022][ C0] Code: 20 00 74 0c 48 c7 c7 18 d4 0a 89 e8 35 c0 52 00 48 83 3d 15 be ac 07 00 0f 84 65 04 00 00 e8 12 80 16 00 48 8b 7c 24 10 57 9d <0f> 1f 44 00 00 f6 44 24 07 01 75 52 e8 fa 7f 16 00 eb 63 0f 1f 84 [ 189.595026][ C0] RSP: 0018:ffffc9000dbaf8e0 EFLAGS: 00000283 ORIG_RAX: ffffffffffffff13 [ 189.595033][ C0] RAX: ffffffff815e160e RBX: 0000000000000200 RCX: 0000000000040000 [ 189.595037][ C0] RDX: ffffc9000e002000 RSI: 00000000000123a1 RDI: 0000000000000283 [ 189.595044][ C0] RBP: ffffc9000dbaf998 R08: ffffffff817a2210 R09: fffffbfff121aff9 [ 189.595051][ C0] R10: fffffbfff121aff9 R11: 0000000000000000 R12: dffffc0000000000 [ 189.595057][ C0] R13: 0000000000000000 R14: 0000000000000000 R15: ffffffff892be558 [ 189.595068][ C0] ? trace_hardirqs_on+0x30/0x70 [ 189.595075][ C0] ? console_unlock+0xa1e/0xec0 [ 189.595090][ C0] ? __down_trylock_console_sem+0x178/0x1b0 [ 189.595098][ C0] ? vprintk_emit+0x1db/0x3b0 [ 189.595105][ C0] ? vprintk_emit+0x1db/0x3b0 [ 189.595114][ C0] vprintk_emit+0x1f8/0x3b0 [ 189.595122][ C0] printk+0x62/0x83 [ 189.595132][ C0] ? __ntfs_error+0x15e/0x190 [ 189.595141][ C0] __ntfs_error+0x185/0x190 [ 189.595150][ C0] ? parse_options+0x39d/0x1dd0 [ 189.595160][ C0] parse_options+0x3df/0x1dd0 [ 189.595174][ C0] ntfs_fill_super+0x1e2/0x89f0 [ 189.595183][ C0] ? pointer+0x23f/0x7c0 [ 189.595198][ C0] ? snprintf+0x6f/0x90 [ 189.595207][ C0] ? set_blocksize+0x1a8/0x3b0 [ 189.595216][ C0] mount_bdev+0x232/0x340 [ 189.595225][ C0] ? ntfs_mount+0x40/0x40 [ 189.595235][ C0] legacy_get_tree+0xea/0x180 [ 189.595244][ C0] ? ntfs_rl_punch_nolock+0x17d0/0x17d0 [ 189.595252][ C0] vfs_get_tree+0x88/0x270 [ 189.595262][ C0] do_mount+0x17d5/0x2440 [ 189.595271][ C0] ? _copy_from_user+0x116/0x170 [ 189.595281][ C0] __se_sys_mount+0xd3/0x100 [ 189.595291][ C0] do_syscall_64+0xf3/0x1b0 [ 189.595301][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 189.595308][ C0] RIP: 0033:0x45f29a [ 189.595316][ C0] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 07:19:14 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, 0x0, 0x0) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 07:19:14 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x5, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB=',']) [ 189.595322][ C0] RSP: 002b:00007fb6c0e9aa68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 189.595334][ C0] RAX: ffffffffffffffda RBX: 00007fb6c0e9b6d4 RCX: 000000000045f29a [ 189.595341][ C0] RDX: 00007fb6c0e9aae0 RSI: 00000000200001c0 RDI: 00007fb6c0e9ab00 [ 189.595347][ C0] RBP: 000000000076bf00 R08: 00007fb6c0e9ab40 R09: 00007fb6c0e9aae0 [ 189.595354][ C0] R10: 0000000000000000 R11: 0000000000000206 R12: 00000000ffffffff [ 189.595360][ C0] R13: 0000000000000be7 R14: 00000000004ce08e R15: 000000000076bf0c 07:19:14 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, 0x0, 0x0) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 190.001925][T10539] ntfs: (device loop4): parse_options(): Unrecognized mount option . [ 190.048843][T10528] ntfs: (device loop1): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 190.070026][T10528] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 07:19:14 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x5865, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="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"], 0x9c}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) [ 190.122774][T10539] ntfs: (device loop4): parse_options(): Unrecognized mount option . [ 190.172765][T10528] ntfs: (device loop1): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 190.202092][T10528] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 07:19:14 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0xd, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0]) 07:19:14 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, 0x0, 0x0) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 190.252511][T10553] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 190.267859][T10553] device vlan3 entered promiscuous mode [ 190.273895][T10553] device bond_slave_0 entered promiscuous mode [ 190.285324][T10553] device bond_slave_0 left promiscuous mode [ 190.386513][T10539] ntfs: (device loop4): parse_options(): Unrecognized mount option . [ 190.444706][T10539] ntfs: (device loop4): parse_options(): Unrecognized mount option . [ 190.470671][T10567] ntfs: (device loop1): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. 07:19:15 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 07:19:15 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x6, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB=',']) 07:19:15 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0, @ANYBLOB=',dmask']) 07:19:15 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 07:19:15 executing program 0: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:15 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0xe, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0]) 07:19:15 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x7, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB=',']) 07:19:15 executing program 0: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:15 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x10, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0]) 07:19:15 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 07:19:15 executing program 0: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:15 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:15 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 07:19:15 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:15 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0, @ANYBLOB=',dmask']) 07:19:15 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:15 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:15 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 07:19:15 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x8, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB=',']) 07:19:15 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x11, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0]) 07:19:15 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 07:19:15 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:15 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0, @ANYBLOB=',dmask']) 07:19:15 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 07:19:16 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 07:19:16 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:16 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0, @ANYBLOB=',dmask=']) 07:19:16 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x9, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB=',']) 07:19:16 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 07:19:16 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x12, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0]) 07:19:16 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0], 0x4}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:16 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0, @ANYBLOB=',dmask=']) 07:19:16 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 07:19:16 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0], 0x4}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:16 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 07:19:16 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0], 0x4}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:16 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0xa, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB=',']) 07:19:16 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB], 0x5}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:16 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0, @ANYBLOB=',dmask=']) 07:19:16 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB], 0x5}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:16 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 07:19:16 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x25, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0]) 07:19:16 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB], 0x5}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:16 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0xb, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB=',']) 07:19:16 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="e1b49415642c249dc58c72d62e22b270c659ef95c90323e3a0d9d545edb46beece802952ef6bf6dd57e2811d714a1f1d89eec3bbef1c421e75ea77088cb6b11984850f741717abcdc2492e1cbb1157cbb33424d33e835196d4f132e006000000368e6e4fbb581bceca12f5e1c0eb72c4d2e0a00a1500e8bb450000dfecb638747262a08908e0f4ceb186bed84290dfe0e9c17df1e075"], 0x5}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:16 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB=',dmask=0']) 07:19:16 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 07:19:16 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="e1b49415642c249dc58c72d62e22b270c659ef95c90323e3a0d9d545edb46beece802952ef6bf6dd57e2811d714a1f1d89eec3bbef1c421e75ea77088cb6b11984850f741717abcdc2492e1cbb1157cbb33424d33e835196d4f132e006000000368e6e4fbb581bceca12f5e1c0eb72c4d2e0a00a1500e8bb450000dfecb638747262a08908e0f4ceb186bed84290dfe0e9c17df1e075"], 0x5}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:16 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="e1b49415642c249dc58c72d62e22b270c659ef95c90323e3a0d9d545edb46beece802952ef6bf6dd57e2811d714a1f1d89eec3bbef1c421e75ea77088cb6b11984850f741717abcdc2492e1cbb1157cbb33424d33e835196d4f132e006000000368e6e4fbb581bceca12f5e1c0eb72c4d2e0a00a1500e8bb450000dfecb638747262a08908e0f4ceb186bed84290dfe0e9c17df1e075"], 0x5}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:16 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x48, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0]) 07:19:16 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="e1b49415642c249dc58c72d62e22b270c659ef95c90323e3a0d9d545edb46beece802952ef6bf6dd57e2811d714a1f1d89eec3bbef1c421e75ea77088cb6b11984850f741717abcdc2492e1cbb1157cbb33424d33e835196d4f132e006000000368e6e4fbb581bceca12f5e1c0eb72c4d2e0a00a1500e8bb450000dfecb638747262a08908e0f4ceb186bed84290dfe0e9c17df1e075b3a6e961a0b7794926301193a3368e1259b983920575da5ab5b08831b56818b9b3bd0238b0522900f13a9480fd64fe4dc2a1153bd376d1bec5ddb5d0fdbd820fb0637c6be548e7456632bb"], 0x5}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:17 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB]) 07:19:17 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 07:19:17 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0xc, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB=',']) 07:19:17 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 07:19:17 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="e1b49415642c249dc58c72d62e22b270c659ef95c90323e3a0d9d545edb46beece802952ef6bf6dd57e2811d714a1f1d89eec3bbef1c421e75ea77088cb6b11984850f741717abcdc2492e1cbb1157cbb33424d33e835196d4f132e006000000368e6e4fbb581bceca12f5e1c0eb72c4d2e0a00a1500e8bb450000dfecb638747262a08908e0f4ceb186bed84290dfe0e9c17df1e075b3a6e961a0b7794926301193a3368e1259b983920575da5ab5b08831b56818b9b3bd0238b0522900f13a9480fd64fe4dc2a1153bd376d1bec5ddb5d0fdbd820fb0637c6be548e7456632bb"], 0x5}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:17 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="e1b49415642c249dc58c72d62e22b270c659ef95c90323e3a0d9d545edb46beece802952ef6bf6dd57e2811d714a1f1d89eec3bbef1c421e75ea77088cb6b11984850f741717abcdc2492e1cbb1157cbb33424d33e835196d4f132e006000000368e6e4fbb581bceca12f5e1c0eb72c4d2e0a00a1500e8bb450000dfecb638747262a08908e0f4ceb186bed84290dfe0e9c17df1e075b3a6e961a0b7794926301193a3368e1259b983920575da5ab5b08831b56818b9b3bd0238b0522900f13a9480fd64fe4dc2a1153bd376d1bec5ddb5d0fdbd820fb0637c6be548e7456632bb"], 0x5}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:17 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="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"], 0x5}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:17 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="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"], 0x5}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:17 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 07:19:17 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB]) 07:19:17 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x4c, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0]) 07:19:17 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="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"], 0x5}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:17 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0xd, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB=',']) 07:19:17 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="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"], 0x5}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:17 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB]) 07:19:17 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="033d0000000000006800120009000100766c616e00000000580002000c00020002000000020000000600010000000000400003000c00010020000000050000000c00010008000000010000800c00010002000000070000000c000100b0000000200000000c00010020000000030000000a000500220000000000000008000a00393d7f2a886f5e0c07929ebacfeebcd68d585ca42013280f666dcd8dbf765432d95db7f7bf5f646c6f16921b8ec95cdae9e1728c2592802e1e2699ff9c66360f8e9fc398b83641d023b2dc0f48a746e9f600fd1a296a6df9b99e7bffae330f3abc295b1eba4b2c9a79021e32b2bde641522ebf4beb3c950c1b719c46df536624981dfd", @ANYRES32=0x0, @ANYBLOB="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"], 0x5}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:17 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 07:19:17 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x5c, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0]) 07:19:17 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="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"], 0x5}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:17 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="e1b49415642c249dc58c72d62e22b270c659ef95c90323e3a0d9d545edb46beece802952ef6bf6dd57e2811d714a1f1d89eec3bbef1c421e75ea77088cb6b11984850f741717abcdc2492e1cbb1157cbb33424d33e835196d4f132e006000000368e6e4fbb581bceca12f5e1c0eb72c4d2e0a00a1500e8bb450000dfecb638747262a08908e0f4ceb186bed84290dfe0e9c17df1e075b3a6e961a0b7794926301193a3368e1259b983920575da5ab5b08831b56818b9b3bd0238b0522900f13a9480fd64fe4dc2a1153bd376d1bec5ddb5d0fdbd820fb0637c6be548e7456632bbbdba881836b306acba4e43e24113faf494f975be9327b5eae6526a51366f83801675f4b8982bc6b0fd19062cd023abe028e9d0e0293d117cce9f01000000000000"], 0x5}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:17 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="033d0000000000006800120009000100766c616e00000000580002000c00020002000000020000000600010000000000400003000c00010020000000050000000c00010008000000010000800c00010002000000070000000c000100b0000000200000000c00010020000000030000000a000500220000000000000008000a00393d7f2a886f5e0c07929ebacfeebcd68d585ca42013280f666dcd8dbf765432d95db7f7bf5f646c6f16921b8ec95cdae9e1728c2592802e1e2699ff9c66360f8e9fc398b83641d023b2dc0f48a746e9f600fd1a296a6df9b99e7bffae330f3abc295b1eba4b2c9a79021e32b2bde641522ebf4beb3c950c1b719c46df536624981dfd", @ANYRES32=0x0, @ANYBLOB="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"], 0x5}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:17 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="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"], 0x5}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:17 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB=',dma']) 07:19:17 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0xe, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB=',']) 07:19:17 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 07:19:17 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="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"], 0x5}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:17 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x60, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0]) 07:19:17 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="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"], 0x5}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:18 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="e1b49415642c249dc58c72d62e22b270c659ef95c90323e3a0d9d545edb46beece802952ef6bf6dd57e2811d714a1f1d89eec3bbef1c421e75ea77088cb6b11984850f741717abcdc2492e1cbb1157cbb33424d33e835196d4f132e006000000368e6e4fbb581bceca12f5e1c0eb72c4d2e0a00a1500e8bb450000dfecb638747262a08908e0f4ceb186bed84290dfe0e9c17df1e075b3a6e961a0b7794926301193a3368e1259b983920575da5ab5b08831b56818b9b3bd0238b0522900f13a9480fd64fe4dc2a1153bd376d1bec5ddb5d0fdbd820fb0637c6be548e7456632bbbdba881836b306acba4e43e24113faf494f975be9327b5eae6526a51366f83801675f4b8982bc6b0fd19062cd023abe028e9d0e0293d117cce9f01000000000000001b657937"], 0x5}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:18 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 07:19:18 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB=',dma']) 07:19:18 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="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"], 0x5}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:18 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x68, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0]) 07:19:18 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x10, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB=',']) 07:19:18 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="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"], 0x5}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:18 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 07:19:18 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="e1b49415642c249dc58c72d62e22b270c659ef95c90323e3a0d9d545edb46beece802952ef6bf6dd57e2811d714a1f1d89eec3bbef1c421e75ea77088cb6b11984850f741717abcdc2492e1cbb1157cbb33424d33e835196d4f132e006000000368e6e4fbb581bceca12f5e1c0eb72c4d2e0a00a1500e8bb450000dfecb638747262a08908e0f4ceb186bed84290dfe0e9c17df1e075b3a6e961a0b7794926301193a3368e1259b983920575da5ab5b08831b56818b9b3bd0238b0522900f13a9480fd64fe4dc2a1153bd376d1bec5ddb5d0fdbd820fb0637c6be548e7456632bbbdba881836b306acba4e43e24113faf494f975be9327b5eae6526a51366f83801675f4b8982bc6b0fd19062cd023abe028e9d0e0293d117cce9f01000000000000001b6579370f7f"], 0x5}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:18 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="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"], 0x5}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:18 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB=',dma']) 07:19:18 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="e1b49415642c249dc58c72d62e22b270c659ef95c90323e3a0d9d545edb46beece802952ef6bf6dd57e2811d714a1f1d89eec3bbef1c421e75ea77088cb6b11984850f741717abcdc2492e1cbb1157cbb33424d33e835196d4f132e006000000368e6e4fbb581bceca12f5e1c0eb72c4d2e0a00a1500e8bb450000dfecb638747262a08908e0f4ceb186bed84290dfe0e9c17df1e075b3a6e961a0b7794926301193a3368e1259b983920575da5ab5b08831b56818b9b3bd0238b0522900f13a9480fd64fe4dc2a1153bd376d1bec5ddb5d0fdbd820fb0637c6be548e7456632bbbdba881836b306acba4e43e24113faf494f975be9327b5eae6526a51366f83801675f4b8982bc6b0fd19062cd023abe028e9d0e0293d117cce9f01000000000000001b6579370f7fe0"], 0x5}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:18 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="e1b49415642c249dc58c72d62e22b270c659ef95c90323e3a0d9d545edb46beece802952ef6bf6dd57e2811d714a1f1d89eec3bbef1c421e75ea77088cb6b11984850f741717abcdc2492e1cbb1157cbb33424d33e835196d4f132e006000000368e6e4fbb581bceca12f5e1c0eb72c4d2e0a00a1500e8bb450000dfecb638747262a08908e0f4ceb186bed84290dfe0e9c17df1e075b3a6e961a0b7794926301193a3368e1259b983920575da5ab5b08831b56818b9b3bd0238b0522900f13a9480fd64fe4dc2a1153bd376d1bec5ddb5d0fdbd820fb0637c6be548e7456632bbbdba881836b306acba4e43e24113faf494f975be9327b5eae6526a51366f83801675f4b8982bc6b0fd19062cd023abe028e9d0e0293d117cce9f01000000000000001b6579370f7fe0"], 0x5}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:18 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x6c, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0]) 07:19:18 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="033d0000000000006800120009000100766c616e00000000580002000c00020002000000020000000600010000000000400003000c00010020000000050000000c00010008000000010000800c00010002000000070000000c000100b0000000200000000c00010020000000030000000a000500220000000000000008000a00393d7f2a886f5e0c07929ebacfeebcd68d585ca42013280f666dcd8dbf765432d95db7f7bf5f646c6f16921b8ec95cdae9e1728c2592802e1e2699ff9c66360f8e9fc398b83641d023b2dc0f48a746e9f600fd1a296a6df9b99e7bffae330f3abc295b1eba4b2c9a79021e32b2bde641522ebf4beb3c950c1b719c46df536624981dfd", @ANYBLOB="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"], 0x4}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:18 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x11, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB=',']) 07:19:18 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB=',dmask']) 07:19:18 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 07:19:18 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="033d0000000000006800120009000100766c616e00000000580002000c00020002000000020000000600010000000000400003000c00010020000000050000000c00010008000000010000800c00010002000000070000000c000100b0000000200000000c00010020000000030000000a000500220000000000000008000a00393d7f2a886f5e0c07929ebacfeebcd68d585ca42013280f666dcd8dbf765432d95db7f7bf5f646c6f16921b8ec95cdae9e1728c2592802e1e2699ff9c66360f8e9fc398b83641d023b2dc0f48a746e9f600fd1a296a6df9b99e7bffae330f3abc295b1eba4b2c9a79021e32b2bde641522ebf4beb3c950c1b719c46df536624981dfd", @ANYBLOB="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"], 0x4}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:18 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB=',dmask']) 07:19:18 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="033d0000000000006800120009000100766c616e00000000580002000c00020002000000020000000600010000000000400003000c00010020000000050000000c00010008000000010000800c00010002000000070000000c000100b0000000200000000c00010020000000030000000a000500220000000000000008000a00393d7f2a886f5e0c07929ebacfeebcd68d585ca42013280f666dcd8dbf765432d95db7f7bf5f646c6f16921b8ec95cdae9e1728c2592802e1e2699ff9c66360f8e9fc398b83641d023b2dc0f48a746e9f600fd1a296a6df9b99e7bffae330f3abc295b1eba4b2c9a79021e32b2bde641522ebf4beb3c950c1b719c46df536624981dfd", @ANYBLOB="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"], 0x4}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:18 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x4}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:18 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x12, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB=',']) 07:19:18 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(0xffffffffffffffff, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 07:19:18 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x4}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:18 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x74, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0]) 07:19:19 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB=',dmask']) 07:19:19 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x4}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:19 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="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"], 0x5}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:19 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x25, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB=',']) 07:19:19 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(0xffffffffffffffff, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 07:19:19 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="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"], 0x5}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:19 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x7a, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0]) 07:19:19 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB=',dmask=']) [ 194.680197][T11016] __ntfs_error: 114 callbacks suppressed [ 194.680206][T11016] ntfs: (device loop4): parse_options(): Unrecognized mount option . [ 194.714264][T11016] ntfs: (device loop4): parse_options(): Unrecognized mount option . 07:19:19 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="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"], 0x5}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) [ 194.786454][T11025] ntfs: (device loop1): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 194.798234][T11026] ntfs: (device loop2): parse_options(): Unrecognized mount option . [ 194.816737][T11016] ntfs: (device loop4): parse_options(): Unrecognized mount option . 07:19:19 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(0xffffffffffffffff, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 07:19:19 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="033d0000000000006800120009000100766c616e00000000580002000c00020002000000020000000600010000000000400003000c00010020000000050000000c00010008000000010000800c00010002000000070000000c000100b0000000200000000c00010020000000030000000a000500220000000000000008000a00393d", @ANYRES32=0x0, @ANYBLOB="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"], 0x5}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) [ 194.836419][T11026] ntfs: (device loop2): parse_options(): The dmask option requires an argument. [ 194.863137][T11016] ntfs: (device loop4): parse_options(): Unrecognized mount option . [ 194.875723][T11025] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 07:19:19 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB=',dmask=']) 07:19:19 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="033d0000000000006800120009000100766c616e00000000580002000c00020002000000020000000600010000000000400003000c00010020000000050000000c00010008000000010000800c00010002000000070000000c000100b0000000200000000c00010020000000030000000a000500220000000000000008000a00393d", @ANYRES32=0x0, @ANYBLOB="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"], 0x5}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:19 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x48, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB=',']) 07:19:19 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r3 = dup3(r2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 07:19:19 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="033d0000000000006800120009000100766c616e00000000580002000c00020002000000020000000600010000000000400003000c00010020000000050000000c00010008000000010000800c00010002000000070000000c000100b0000000200000000c00010020000000030000000a000500220000000000000008000a00393d", @ANYRES32=0x0, @ANYBLOB="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"], 0x5}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) [ 195.094889][T11025] ntfs: (device loop1): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. 07:19:19 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="033d0000000000006800120009000100766c616e00000000580002000c00020002000000020000000600010000000000400003000c00010020000000050000000c00010008000000010000800c00010002000000070000000c000100b0000000200000000c00010020000000030000000a000500220000000000000008000a00393d7f2a886f5e0c07929ebacfeebcd68d585ca42013280f666dcd8dbf765432d95db7f7bf5f646c6f16921b8ec95cdae9e1728c2592802e1e2699ff9c66360f8e9fc3", @ANYRES32=0x0, @ANYBLOB="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"], 0x5}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) [ 195.142125][T11058] ntfs: (device loop4): parse_options(): Unrecognized mount option . 07:19:19 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="033d0000000000006800120009000100766c616e00000000580002000c00020002000000020000000600010000000000400003000c00010020000000050000000c00010008000000010000800c00010002000000070000000c000100b0000000200000000c00010020000000030000000a000500220000000000000008000a00393d7f2a886f5e0c07929ebacfeebcd68d585ca42013280f666dcd8dbf765432d95db7f7bf5f646c6f16921b8ec95cdae9e1728c2592802e1e2699ff9c66360f8e9fc3", @ANYRES32=0x0, @ANYBLOB="e1b49415642c249dc58c72d62e22b270c659ef95c90323e3a0d9d545edb46beece802952ef6bf6dd57e2811d714a1f1d89eec3bbef1c421e75ea77088cb6b11984850f741717abcdc2492e1cbb1157cbb33424d33e835196d4f132e006000000368e6e4fbb581bceca12f5e1c0eb72c4d2e0a00a1500e8bb450000dfecb638747262a08908e0f4ceb186bed84290dfe0e9c17df1e075b3a6e961a0b7794926301193a3368e1259b983920575da5ab5b08831b56818b9b3bd0238b0522900f13a9480fd64fe4dc2a1153bd376d1bec5ddb5d0fdbd820fb0637c6be548e7456632bbbdba881836b306acba4e43e24113faf494f975be9327b5eae6526a51366f83801675f4b8982bc6b0fd19062cd023abe028e9d0e0293d117cce9f01000000000000001b6579370f7fe0f0"], 0x5}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:19 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x19c, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0]) 07:19:19 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="033d0000000000006800120009000100766c616e00000000580002000c00020002000000020000000600010000000000400003000c00010020000000050000000c00010008000000010000800c00010002000000070000000c000100b0000000200000000c00010020000000030000000a000500220000000000000008000a00393d7f2a886f5e0c07929ebacfeebcd68d585ca42013280f666dcd8dbf765432d95db7f7bf5f646c6f16921b8ec95cdae9e1728c2592802e1e2699ff9c66360f8e9fc3", @ANYRES32=0x0, @ANYBLOB="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"], 0x5}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:19 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r3 = dup3(r2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 07:19:19 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="033d0000000000006800120009000100766c616e00000000580002000c00020002000000020000000600010000000000400003000c00010020000000050000000c00010008000000010000800c00010002000000070000000c000100b0000000200000000c00010020000000030000000a000500220000000000000008000a00393d7f2a886f5e0c07929ebacfeebcd68d585ca42013280f666dcd8dbf765432d95db7f7bf5f646c6f16921b8ec95cdae9e1728c2592802e1e2699ff9c66360f8e9fc398b83641d023b2dc0f48a746e9f600fd1a296a6df9b99e7bffae330f3abc295b", @ANYRES32=0x0, @ANYBLOB="e1b49415642c249dc58c72d62e22b270c659ef95c90323e3a0d9d545edb46beece802952ef6bf6dd57e2811d714a1f1d89eec3bbef1c421e75ea77088cb6b11984850f741717abcdc2492e1cbb1157cbb33424d33e835196d4f132e006000000368e6e4fbb581bceca12f5e1c0eb72c4d2e0a00a1500e8bb450000dfecb638747262a08908e0f4ceb186bed84290dfe0e9c17df1e075b3a6e961a0b7794926301193a3368e1259b983920575da5ab5b08831b56818b9b3bd0238b0522900f13a9480fd64fe4dc2a1153bd376d1bec5ddb5d0fdbd820fb0637c6be548e7456632bbbdba881836b306acba4e43e24113faf494f975be9327b5eae6526a51366f83801675f4b8982bc6b0fd19062cd023abe028e9d0e0293d117cce9f01000000000000001b6579370f7fe0f0"], 0x5}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:19 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x4c, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB=',']) 07:19:19 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB=',dmask=']) 07:19:20 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="033d0000000000006800120009000100766c616e00000000580002000c00020002000000020000000600010000000000400003000c00010020000000050000000c00010008000000010000800c00010002000000070000000c000100b0000000200000000c00010020000000030000000a000500220000000000000008000a00393d7f2a886f5e0c07929ebacfeebcd68d585ca42013280f666dcd8dbf765432d95db7f7bf5f646c6f16921b8ec95cdae9e1728c2592802e1e2699ff9c66360f8e9fc398b83641d023b2dc0f48a746e9f600fd1a296a6df9b99e7bffae330f3abc295b", @ANYRES32=0x0, @ANYBLOB="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"], 0x5}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:20 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x48, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB=',']) 07:19:20 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="033d0000000000006800120009000100766c616e00000000580002000c00020002000000020000000600010000000000400003000c00010020000000050000000c00010008000000010000800c00010002000000070000000c000100b0000000200000000c00010020000000030000000a000500220000000000000008000a00393d7f2a886f5e0c07929ebacfeebcd68d585ca42013280f666dcd8dbf765432d95db7f7bf5f646c6f16921b8ec95cdae9e1728c2592802e1e2699ff9c66360f8e9fc398b83641d023b2dc0f48a746e9f600fd1a296a6df9b99e7bffae330f3abc295b", @ANYRES32=0x0, @ANYBLOB="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"], 0x5}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:20 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r3 = dup3(r2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 07:19:20 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="033d0000000000006800120009000100766c616e00000000580002000c00020002000000020000000600010000000000400003000c00010020000000050000000c00010008000000010000800c00010002000000070000000c000100b0000000200000000c00010020000000030000000a000500220000000000000008000a00393d7f2a886f5e0c07929ebacfeebcd68d585ca42013280f666dcd8dbf765432d95db7f7bf5f646c6f16921b8ec95cdae9e1728c2592802e1e2699ff9c66360f8e9fc398b83641d023b2dc0f48a746e9f600fd1a296a6df9b99e7bffae330f3abc295b1eba4b2c9a79021e32b2bde641522ebf", @ANYRES32=0x0, @ANYBLOB="e1b49415642c249dc58c72d62e22b270c659ef95c90323e3a0d9d545edb46beece802952ef6bf6dd57e2811d714a1f1d89eec3bbef1c421e75ea77088cb6b11984850f741717abcdc2492e1cbb1157cbb33424d33e835196d4f132e006000000368e6e4fbb581bceca12f5e1c0eb72c4d2e0a00a1500e8bb450000dfecb638747262a08908e0f4ceb186bed84290dfe0e9c17df1e075b3a6e961a0b7794926301193a3368e1259b983920575da5ab5b08831b56818b9b3bd0238b0522900f13a9480fd64fe4dc2a1153bd376d1bec5ddb5d0fdbd820fb0637c6be548e7456632bbbdba881836b306acba4e43e24113faf494f975be9327b5eae6526a51366f83801675f4b8982bc6b0fd19062cd023abe028e9d0e0293d117cce9f01000000000000001b6579370f7fe0f0"], 0x5}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:20 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="033d0000000000006800120009000100766c616e00000000580002000c00020002000000020000000600010000000000400003000c00010020000000050000000c00010008000000010000800c00010002000000070000000c000100b0000000200000000c00010020000000030000000a000500220000000000000008000a00393d7f2a886f5e0c07929ebacfeebcd68d585ca42013280f666dcd8dbf765432d95db7f7bf5f646c6f16921b8ec95cdae9e1728c2592802e1e2699ff9c66360f8e9fc398b83641d023b2dc0f48a746e9f600fd1a296a6df9b99e7bffae330f3abc295b1eba4b2c9a79021e32b2bde641522ebf", @ANYRES32=0x0, @ANYBLOB="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"], 0x5}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:20 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x1ac, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0]) 07:19:20 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="033d0000000000006800120009000100766c616e00000000580002000c00020002000000020000000600010000000000400003000c00010020000000050000000c00010008000000010000800c00010002000000070000000c000100b0000000200000000c00010020000000030000000a000500220000000000000008000a00393d7f2a886f5e0c07929ebacfeebcd68d585ca42013280f666dcd8dbf765432d95db7f7bf5f646c6f16921b8ec95cdae9e1728c2592802e1e2699ff9c66360f8e9fc398b83641d023b2dc0f48a746e9f600fd1a296a6df9b99e7bffae330f3abc295b1eba4b2c9a79021e32b2bde641522ebf", @ANYRES32=0x0, @ANYBLOB="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"], 0x5}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:20 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x5c, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB=',']) 07:19:20 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x48, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB=',']) 07:19:20 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="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"], 0x5}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:20 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 07:19:20 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="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"], 0x5}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:20 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="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"], 0x5}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:20 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="e1b49415642c249dc58c72d62e22b270c659ef95c90323e3a0d9d545edb46beece802952ef6bf6dd57e2811d714a1f1d89eec3bbef1c421e75ea77088cb6b11984850f741717abcdc2492e1cbb1157cbb33424d33e835196d4f132e006000000368e6e4fbb581bceca12f5e1c0eb72c4d2e0a00a1500e8bb450000dfecb638747262a08908e0f4ceb186bed84290dfe0e9c17df1e075b3a6e961a0b7794926301193a3368e1259b983920575da5ab5b08831b56818b9b3bd0238b0522900f13a9480fd64fe4dc2a1153bd376d1bec5ddb5d0fdbd820fb0637c6be548e7456632bbbdba881836b306acba4e43e24113faf494f975be9327b5eae6526a51366f83801675f4b8982bc6b0fd19062cd023abe028e9d0e0293d117cce9f01000000000000001b6579370f7fe0f0"], 0x5}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:20 executing program 4: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x68, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB=',']) 07:19:20 executing program 2: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x48, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB=',']) 07:19:20 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x1d1, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='disable_sparse=no,dmask=00000000000000000000000,umask=00000000000000000000000,dmask=00000000000000000000000,mft_zone_multiplier=0x0000000000000000,dmask=00000000000000000000000,uid=', @ANYRESHEX=0x0]) 07:19:20 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="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"], 0x5}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:20 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="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"], 0x5}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:20 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="e1b49415642c249dc58c72d62e22b270c659ef95c90323e3a0d9d545edb46beece802952ef6bf6dd57e2811d714a1f1d89eec3bbef1c421e75ea77088cb6b11984850f741717abcdc2492e1cbb1157cbb33424d33e835196d4f132e006000000368e6e4fbb581bceca12f5e1c0eb72c4d2e0a00a1500e8bb450000dfecb638747262a08908e0f4ceb186bed84290dfe0e9c17df1e075b3a6e961a0b7794926301193a3368e1259b983920575da5ab5b08831b56818b9b3bd0238b0522900f13a9480fd64fe4dc2a1153bd376d1bec5ddb5d0fdbd820fb0637c6be548e7456632bbbdba881836b306acba4e43e24113faf494f975be9327b5eae6526a51366f83801675f4b8982bc6b0fd19062cd023abe028e9d0e0293d117cce9f01000000000000001b6579370f7fe0f0"], 0x5}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 07:19:20 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 07:19:20 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c0000001000050782410f000000000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="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"], 0x5}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendm