fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:15 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x48c, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@TCA_CHAIN={0x8, 0xb, 0x1}, @filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x14, 0x2, [@TCA_ROUTE4_TO={0x8, 0x2, 0x32}, @TCA_ROUTE4_TO={0x8, 0x2, 0x6b}]}}, @TCA_CHAIN={0x8, 0xb, 0x7}, @TCA_RATE={0x6, 0x5, {0x40, 0x8}}, @filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x424, 0x2, [@TCA_TCINDEX_FALL_THROUGH={0x8}, @TCA_TCINDEX_POLICE={0x408, 0x6, [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff48, 0x0, 0x0, 0x0, 0x0, 0xc82, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x5]}]}, @TCA_TCINDEX_SHIFT={0x8, 0x3, 0x3}, @TCA_TCINDEX_CLASSID={0x8, 0x5, {0xc, 0x3}}]}}]}, 0x48c}, 0x1, 0x0, 0x0, 0x4000800}, 0x4004800) read$hiddev(0xffffffffffffffff, &(0x7f0000000d80)=""/58, 0x3a) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, &(0x7f0000000dc0)={0x1, 0xffffffff, 0x9, 0x0, 0x3, 0x8000}) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf, 0x0, 0x3, 0x296}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001100)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd_index=0x7, 0x0, 0x0, 0x9, 0x0, 0x1}, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:15 executing program 0: sendmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) syz_genetlink_get_family_id$batadv(0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d088", 0x3}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b", 0x48, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid'}}, {@umask={'umask'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) bind$can_raw(r2, &(0x7f00000023c0), 0x10) 09:42:15 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x48c, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@TCA_CHAIN={0x8, 0xb, 0x1}, @filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x14, 0x2, [@TCA_ROUTE4_TO={0x8, 0x2, 0x32}, @TCA_ROUTE4_TO={0x8, 0x2, 0x6b}]}}, @TCA_CHAIN={0x8, 0xb, 0x7}, @TCA_RATE={0x6, 0x5, {0x40, 0x8}}, @filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x424, 0x2, [@TCA_TCINDEX_FALL_THROUGH={0x8}, @TCA_TCINDEX_POLICE={0x408, 0x6, [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff48, 0x0, 0x0, 0x0, 0x0, 0xc82, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x5]}]}, @TCA_TCINDEX_SHIFT={0x8, 0x3, 0x3}, @TCA_TCINDEX_CLASSID={0x8, 0x5, {0xc, 0x3}}]}}]}, 0x48c}, 0x1, 0x0, 0x0, 0x4000800}, 0x4004800) read$hiddev(0xffffffffffffffff, &(0x7f0000000d80)=""/58, 0x3a) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, &(0x7f0000000dc0)={0x1, 0xffffffff, 0x9, 0x0, 0x3, 0x8000}) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf, 0x0, 0x3, 0x296}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001100)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd_index=0x7, 0x0, 0x0, 0x9, 0x0, 0x1}, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:15 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0), 0x0, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r1}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:15 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0), 0x0, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r1}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:15 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:15 executing program 0: sendmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) syz_genetlink_get_family_id$batadv(0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d088", 0x3}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b", 0x48, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid'}}, {@umask={'umask'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) bind$can_raw(r2, &(0x7f00000023c0), 0x10) 09:42:15 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x48c, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@TCA_CHAIN={0x8, 0xb, 0x1}, @filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x14, 0x2, [@TCA_ROUTE4_TO={0x8, 0x2, 0x32}, @TCA_ROUTE4_TO={0x8, 0x2, 0x6b}]}}, @TCA_CHAIN={0x8, 0xb, 0x7}, @TCA_RATE={0x6, 0x5, {0x40, 0x8}}, @filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x424, 0x2, [@TCA_TCINDEX_FALL_THROUGH={0x8}, @TCA_TCINDEX_POLICE={0x408, 0x6, [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff48, 0x0, 0x0, 0x0, 0x0, 0xc82, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x5]}]}, @TCA_TCINDEX_SHIFT={0x8, 0x3, 0x3}, @TCA_TCINDEX_CLASSID={0x8, 0x5, {0xc, 0x3}}]}}]}, 0x48c}, 0x1, 0x0, 0x0, 0x4000800}, 0x4004800) read$hiddev(0xffffffffffffffff, &(0x7f0000000d80)=""/58, 0x3a) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, &(0x7f0000000dc0)={0x1, 0xffffffff, 0x9, 0x0, 0x3, 0x8000}) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf, 0x0, 0x3, 0x296}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001100)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd_index=0x7, 0x0, 0x0, 0x9, 0x0, 0x1}, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:15 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:16 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0), 0x0, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r1}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:16 executing program 0: sendmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) syz_genetlink_get_family_id$batadv(0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d088", 0x3}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b", 0x48, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid'}}, {@umask={'umask'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) bind$can_raw(r2, &(0x7f00000023c0), 0x10) 09:42:16 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0), 0x0, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r1}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:16 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x48c, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@TCA_CHAIN={0x8, 0xb, 0x1}, @filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x14, 0x2, [@TCA_ROUTE4_TO={0x8, 0x2, 0x32}, @TCA_ROUTE4_TO={0x8, 0x2, 0x6b}]}}, @TCA_CHAIN={0x8, 0xb, 0x7}, @TCA_RATE={0x6, 0x5, {0x40, 0x8}}, @filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x424, 0x2, [@TCA_TCINDEX_FALL_THROUGH={0x8}, @TCA_TCINDEX_POLICE={0x408, 0x6, [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff48, 0x0, 0x0, 0x0, 0x0, 0xc82, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80]}]}, @TCA_TCINDEX_SHIFT={0x8, 0x3, 0x3}, @TCA_TCINDEX_CLASSID={0x8, 0x5, {0xc, 0x3}}]}}]}, 0x48c}, 0x1, 0x0, 0x0, 0x4000800}, 0x4004800) read$hiddev(0xffffffffffffffff, &(0x7f0000000d80)=""/58, 0x3a) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, &(0x7f0000000dc0)={0x1, 0xffffffff, 0x9, 0x0, 0x3, 0x8000}) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf, 0x0, 0x3, 0x296}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001100)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd_index=0x7, 0x0, 0x0, 0x9, 0x0, 0x1}, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:16 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:16 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x48c, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@TCA_CHAIN={0x8, 0xb, 0x1}, @filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x14, 0x2, [@TCA_ROUTE4_TO={0x8, 0x2, 0x32}, @TCA_ROUTE4_TO={0x8, 0x2, 0x6b}]}}, @TCA_CHAIN={0x8, 0xb, 0x7}, @TCA_RATE={0x6, 0x5, {0x40, 0x8}}, @filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x424, 0x2, [@TCA_TCINDEX_FALL_THROUGH={0x8}, @TCA_TCINDEX_POLICE={0x408, 0x6, [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff48, 0x0, 0x0, 0x0, 0x0, 0xc82, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff]}]}, @TCA_TCINDEX_SHIFT={0x8, 0x3, 0x3}, @TCA_TCINDEX_CLASSID={0x8, 0x5, {0xc, 0x3}}]}}]}, 0x48c}, 0x1, 0x0, 0x0, 0x4000800}, 0x4004800) read$hiddev(0xffffffffffffffff, &(0x7f0000000d80)=""/58, 0x3a) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, &(0x7f0000000dc0)={0x1, 0xffffffff, 0x9, 0x0, 0x3, 0x8000}) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf, 0x0, 0x3, 0x296}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001100)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd_index=0x7, 0x0, 0x0, 0x9, 0x0, 0x1}, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:16 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:16 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x48c, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@TCA_CHAIN={0x8, 0xb, 0x1}, @filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x14, 0x2, [@TCA_ROUTE4_TO={0x8, 0x2, 0x32}, @TCA_ROUTE4_TO={0x8, 0x2, 0x6b}]}}, @TCA_CHAIN={0x8, 0xb, 0x7}, @TCA_RATE={0x6, 0x5, {0x40, 0x8}}, @filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x424, 0x2, [@TCA_TCINDEX_FALL_THROUGH={0x8}, @TCA_TCINDEX_POLICE={0x408, 0x6, [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff48, 0x0, 0x0, 0x0, 0x0, 0xc82, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}]}, @TCA_TCINDEX_SHIFT={0x8, 0x3, 0x3}, @TCA_TCINDEX_CLASSID={0x8, 0x5, {0xc, 0x3}}]}}]}, 0x48c}, 0x1, 0x0, 0x0, 0x4000800}, 0x4004800) read$hiddev(0xffffffffffffffff, &(0x7f0000000d80)=""/58, 0x3a) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, &(0x7f0000000dc0)={0x1, 0xffffffff, 0x9, 0x0, 0x3, 0x8000}) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf, 0x0, 0x3, 0x296}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001100)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd_index=0x7, 0x0, 0x0, 0x9, 0x0, 0x1}, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:16 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x48c, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@TCA_CHAIN={0x8, 0xb, 0x1}, @filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x14, 0x2, [@TCA_ROUTE4_TO={0x8, 0x2, 0x32}, @TCA_ROUTE4_TO={0x8, 0x2, 0x6b}]}}, @TCA_CHAIN={0x8, 0xb, 0x7}, @TCA_RATE={0x6, 0x5, {0x40, 0x8}}, @filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x424, 0x2, [@TCA_TCINDEX_FALL_THROUGH={0x8}, @TCA_TCINDEX_POLICE={0x408, 0x6, [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff48, 0x0, 0x0, 0x0, 0x0, 0xc82, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}]}, @TCA_TCINDEX_SHIFT={0x8, 0x3, 0x3}, @TCA_TCINDEX_CLASSID={0x8, 0x5, {0xc, 0x3}}]}}]}, 0x48c}, 0x1, 0x0, 0x0, 0x4000800}, 0x4004800) read$hiddev(0xffffffffffffffff, &(0x7f0000000d80)=""/58, 0x3a) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, &(0x7f0000000dc0)={0x1, 0xffffffff, 0x9, 0x0, 0x3, 0x8000}) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf, 0x0, 0x3, 0x296}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001100)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd_index=0x7, 0x0, 0x0, 0x9, 0x0, 0x1}, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:16 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43", 0xf, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r1}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:16 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x0, 0x0, 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:16 executing program 0: sendmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) syz_genetlink_get_family_id$batadv(0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d088", 0x3}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b", 0x48, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@umask={'umask'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) bind$can_raw(r1, &(0x7f00000023c0), 0x10) 09:42:16 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:16 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x0, 0x0, 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:16 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:16 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x48c, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@TCA_CHAIN={0x8, 0xb, 0x1}, @filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x14, 0x2, [@TCA_ROUTE4_TO={0x8, 0x2, 0x32}, @TCA_ROUTE4_TO={0x8, 0x2, 0x6b}]}}, @TCA_CHAIN={0x8, 0xb, 0x7}, @TCA_RATE={0x6, 0x5, {0x40, 0x8}}, @filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x424, 0x2, [@TCA_TCINDEX_FALL_THROUGH={0x8}, @TCA_TCINDEX_POLICE={0x408, 0x6, [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff48, 0x0, 0x0, 0x0, 0x0, 0xc82, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}]}, @TCA_TCINDEX_SHIFT={0x8, 0x3, 0x3}, @TCA_TCINDEX_CLASSID={0x8, 0x5, {0xc, 0x3}}]}}]}, 0x48c}, 0x1, 0x0, 0x0, 0x4000800}, 0x4004800) read$hiddev(0xffffffffffffffff, &(0x7f0000000d80)=""/58, 0x3a) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, &(0x7f0000000dc0)={0x1, 0xffffffff, 0x9, 0x0, 0x3, 0x8000}) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf, 0x0, 0x3, 0x296}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001100)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd_index=0x7, 0x0, 0x0, 0x9, 0x0, 0x1}, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:16 executing program 0: sendmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) syz_genetlink_get_family_id$batadv(0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d088", 0x3}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b", 0x48, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@umask={'umask'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) bind$can_raw(r1, &(0x7f00000023c0), 0x10) 09:42:16 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:16 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x48c, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@TCA_CHAIN={0x8, 0xb, 0x1}, @filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x14, 0x2, [@TCA_ROUTE4_TO={0x8, 0x2, 0x32}, @TCA_ROUTE4_TO={0x8, 0x2, 0x6b}]}}, @TCA_CHAIN={0x8, 0xb, 0x7}, @TCA_RATE={0x6, 0x5, {0x40, 0x8}}, @filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x424, 0x2, [@TCA_TCINDEX_FALL_THROUGH={0x8}, @TCA_TCINDEX_POLICE={0x408, 0x6, [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff48, 0x0, 0x0, 0x0, 0x0, 0xc82, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff]}]}, @TCA_TCINDEX_SHIFT={0x8, 0x3, 0x3}, @TCA_TCINDEX_CLASSID={0x8, 0x5, {0xc, 0x3}}]}}]}, 0x48c}, 0x1, 0x0, 0x0, 0x4000800}, 0x4004800) read$hiddev(0xffffffffffffffff, &(0x7f0000000d80)=""/58, 0x3a) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, &(0x7f0000000dc0)={0x1, 0xffffffff, 0x9, 0x0, 0x3, 0x8000}) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf, 0x0, 0x3, 0x296}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001100)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd_index=0x7, 0x0, 0x0, 0x9, 0x0, 0x1}, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:16 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x0, 0x0, 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:16 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:16 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43", 0xf, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r1}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:16 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x48c, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@TCA_CHAIN={0x8, 0xb, 0x1}, @filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x14, 0x2, [@TCA_ROUTE4_TO={0x8, 0x2, 0x32}, @TCA_ROUTE4_TO={0x8, 0x2, 0x6b}]}}, @TCA_CHAIN={0x8, 0xb, 0x7}, @TCA_RATE={0x6, 0x5, {0x40, 0x8}}, @filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x424, 0x2, [@TCA_TCINDEX_FALL_THROUGH={0x8}, @TCA_TCINDEX_POLICE={0x408, 0x6, [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff48, 0x0, 0x0, 0x0, 0x0, 0xc82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff]}]}, @TCA_TCINDEX_SHIFT={0x8, 0x3, 0x3}, @TCA_TCINDEX_CLASSID={0x8, 0x5, {0xc, 0x3}}]}}]}, 0x48c}, 0x1, 0x0, 0x0, 0x4000800}, 0x4004800) read$hiddev(0xffffffffffffffff, &(0x7f0000000d80)=""/58, 0x3a) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, &(0x7f0000000dc0)={0x1, 0xffffffff, 0x9, 0x0, 0x3, 0x8000}) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf, 0x0, 0x3, 0x296}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001100)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd_index=0x7, 0x0, 0x0, 0x9, 0x0, 0x1}, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:16 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:16 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:16 executing program 0: sendmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) syz_genetlink_get_family_id$batadv(0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d088", 0x3}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b", 0x48, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@umask={'umask'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) bind$can_raw(r1, &(0x7f00000023c0), 0x10) 09:42:16 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x48c, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@TCA_CHAIN={0x8, 0xb, 0x1}, @filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x14, 0x2, [@TCA_ROUTE4_TO={0x8, 0x2, 0x32}, @TCA_ROUTE4_TO={0x8, 0x2, 0x6b}]}}, @TCA_CHAIN={0x8, 0xb, 0x7}, @TCA_RATE={0x6, 0x5, {0x40, 0x8}}, @filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x424, 0x2, [@TCA_TCINDEX_FALL_THROUGH={0x8}, @TCA_TCINDEX_POLICE={0x408, 0x6, [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff]}]}, @TCA_TCINDEX_SHIFT={0x8, 0x3, 0x3}, @TCA_TCINDEX_CLASSID={0x8, 0x5, {0xc, 0x3}}]}}]}, 0x48c}, 0x1, 0x0, 0x0, 0x4000800}, 0x4004800) read$hiddev(0xffffffffffffffff, &(0x7f0000000d80)=""/58, 0x3a) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, &(0x7f0000000dc0)={0x1, 0xffffffff, 0x9, 0x0, 0x3, 0x8000}) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf, 0x0, 0x3, 0x296}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001100)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd_index=0x7, 0x0, 0x0, 0x9, 0x0, 0x1}, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:17 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:17 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:17 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:17 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43", 0xf, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r1}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:17 executing program 0: sendmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) syz_genetlink_get_family_id$batadv(0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d088", 0x3}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b", 0x48, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) bind$can_raw(r1, &(0x7f00000023c0), 0x10) 09:42:17 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x48c, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@TCA_CHAIN={0x8, 0xb, 0x1}, @filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x14, 0x2, [@TCA_ROUTE4_TO={0x8, 0x2, 0x32}, @TCA_ROUTE4_TO={0x8, 0x2, 0x6b}]}}, @TCA_CHAIN={0x8, 0xb, 0x7}, @TCA_RATE={0x6, 0x5, {0x40, 0x8}}, @filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x424, 0x2, [@TCA_TCINDEX_FALL_THROUGH={0x8}, @TCA_TCINDEX_POLICE={0x408, 0x6, [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff]}]}, @TCA_TCINDEX_SHIFT={0x8, 0x3, 0x3}, @TCA_TCINDEX_CLASSID={0x8, 0x5, {0xc, 0x3}}]}}]}, 0x48c}, 0x1, 0x0, 0x0, 0x4000800}, 0x4004800) read$hiddev(0xffffffffffffffff, &(0x7f0000000d80)=""/58, 0x3a) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, &(0x7f0000000dc0)={0x1, 0xffffffff, 0x9, 0x0, 0x3, 0x8000}) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf, 0x0, 0x3, 0x296}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001100)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd_index=0x7, 0x0, 0x0, 0x9, 0x0, 0x1}, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:17 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:17 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x48c, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@TCA_CHAIN={0x8, 0xb, 0x1}, @filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x14, 0x2, [@TCA_ROUTE4_TO={0x8, 0x2, 0x32}, @TCA_ROUTE4_TO={0x8, 0x2, 0x6b}]}}, @TCA_CHAIN={0x8, 0xb, 0x7}, @TCA_RATE={0x6, 0x5, {0x40, 0x8}}, @filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x424, 0x2, [@TCA_TCINDEX_FALL_THROUGH={0x8}, @TCA_TCINDEX_POLICE={0x408, 0x6, [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff]}]}, @TCA_TCINDEX_SHIFT={0x8, 0x3, 0x3}, @TCA_TCINDEX_CLASSID={0x8, 0x5, {0xc, 0x3}}]}}]}, 0x48c}, 0x1, 0x0, 0x0, 0x4000800}, 0x4004800) read$hiddev(0xffffffffffffffff, &(0x7f0000000d80)=""/58, 0x3a) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, &(0x7f0000000dc0)={0x1, 0xffffffff, 0x9, 0x0, 0x3, 0x8000}) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf, 0x0, 0x3, 0x296}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001100)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd_index=0x7, 0x0, 0x0, 0x9, 0x0, 0x1}, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:17 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:17 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb", 0x16, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r1}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:17 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:17 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x48c, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@TCA_CHAIN={0x8, 0xb, 0x1}, @filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x14, 0x2, [@TCA_ROUTE4_TO={0x8, 0x2, 0x32}, @TCA_ROUTE4_TO={0x8, 0x2, 0x6b}]}}, @TCA_CHAIN={0x8, 0xb, 0x7}, @TCA_RATE={0x6, 0x5, {0x40, 0x8}}, @filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x424, 0x2, [@TCA_TCINDEX_FALL_THROUGH={0x8}, @TCA_TCINDEX_POLICE={0x408, 0x6, [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff]}]}, @TCA_TCINDEX_SHIFT={0x8, 0x3, 0x3}, @TCA_TCINDEX_CLASSID={0x8, 0x5, {0xc, 0x3}}]}}]}, 0x48c}, 0x1, 0x0, 0x0, 0x4000800}, 0x4004800) read$hiddev(0xffffffffffffffff, &(0x7f0000000d80)=""/58, 0x3a) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, &(0x7f0000000dc0)={0x1, 0xffffffff, 0x9, 0x0, 0x3, 0x8000}) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf, 0x0, 0x3, 0x296}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001100)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd_index=0x7, 0x0, 0x0, 0x9, 0x0, 0x1}, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:17 executing program 0: sendmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) syz_genetlink_get_family_id$batadv(0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d088", 0x3}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b", 0x48, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) bind$can_raw(r1, &(0x7f00000023c0), 0x10) 09:42:17 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x48c, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@TCA_CHAIN={0x8, 0xb, 0x1}, @filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x14, 0x2, [@TCA_ROUTE4_TO={0x8, 0x2, 0x32}, @TCA_ROUTE4_TO={0x8, 0x2, 0x6b}]}}, @TCA_CHAIN={0x8, 0xb, 0x7}, @TCA_RATE={0x6, 0x5, {0x40, 0x8}}, @filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x424, 0x2, [@TCA_TCINDEX_FALL_THROUGH={0x8}, @TCA_TCINDEX_POLICE={0x408, 0x6, [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff]}]}, @TCA_TCINDEX_SHIFT={0x8, 0x3, 0x3}, @TCA_TCINDEX_CLASSID={0x8, 0x5, {0xc, 0x3}}]}}]}, 0x48c}, 0x1, 0x0, 0x0, 0x4000800}, 0x4004800) read$hiddev(0xffffffffffffffff, &(0x7f0000000d80)=""/58, 0x3a) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, &(0x7f0000000dc0)={0x1, 0xffffffff, 0x9, 0x0, 0x3, 0x8000}) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf, 0x0, 0x3, 0x296}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001100)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd_index=0x7, 0x0, 0x0, 0x9, 0x0, 0x1}, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:17 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:17 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb", 0x16, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r1}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:17 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:17 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:17 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x48c, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@TCA_CHAIN={0x8, 0xb, 0x1}, @filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x14, 0x2, [@TCA_ROUTE4_TO={0x8, 0x2, 0x32}, @TCA_ROUTE4_TO={0x8, 0x2, 0x6b}]}}, @TCA_CHAIN={0x8, 0xb, 0x7}, @TCA_RATE={0x6, 0x5, {0x40, 0x8}}, @filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x424, 0x2, [@TCA_TCINDEX_FALL_THROUGH={0x8}, @TCA_TCINDEX_POLICE={0x408, 0x6, [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff]}]}, @TCA_TCINDEX_SHIFT={0x8, 0x3, 0x3}, @TCA_TCINDEX_CLASSID={0x8, 0x5, {0xc, 0x3}}]}}]}, 0x48c}, 0x1, 0x0, 0x0, 0x4000800}, 0x4004800) read$hiddev(0xffffffffffffffff, &(0x7f0000000d80)=""/58, 0x3a) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, &(0x7f0000000dc0)={0x1, 0xffffffff, 0x9, 0x0, 0x3, 0x8000}) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf, 0x0, 0x3, 0x296}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001100)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd_index=0x7, 0x0, 0x0, 0x9, 0x0, 0x1}, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:17 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x48c, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@TCA_CHAIN={0x8, 0xb, 0x1}, @filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x14, 0x2, [@TCA_ROUTE4_TO={0x8, 0x2, 0x32}, @TCA_ROUTE4_TO={0x8, 0x2, 0x6b}]}}, @TCA_CHAIN={0x8, 0xb, 0x7}, @TCA_RATE={0x6, 0x5, {0x40, 0x8}}, @filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x424, 0x2, [@TCA_TCINDEX_FALL_THROUGH={0x8}, @TCA_TCINDEX_POLICE={0x408, 0x6, [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff]}]}, @TCA_TCINDEX_SHIFT={0x8, 0x3, 0x3}, @TCA_TCINDEX_CLASSID={0x8, 0x5, {0xc, 0x3}}]}}]}, 0x48c}, 0x1, 0x0, 0x0, 0x4000800}, 0x4004800) read$hiddev(0xffffffffffffffff, &(0x7f0000000d80)=""/58, 0x3a) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, &(0x7f0000000dc0)={0x1, 0xffffffff, 0x9, 0x0, 0x3, 0x8000}) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf, 0x0, 0x3, 0x296}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001100)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd_index=0x7, 0x0, 0x0, 0x9, 0x0, 0x1}, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:18 executing program 0: sendmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) syz_genetlink_get_family_id$batadv(0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d088", 0x3}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b", 0x48, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) bind$can_raw(r1, &(0x7f00000023c0), 0x10) 09:42:18 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x48c, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@TCA_CHAIN={0x8, 0xb, 0x1}, @filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x14, 0x2, [@TCA_ROUTE4_TO={0x8, 0x2, 0x32}, @TCA_ROUTE4_TO={0x8, 0x2, 0x6b}]}}, @TCA_CHAIN={0x8, 0xb, 0x7}, @TCA_RATE={0x6, 0x5, {0x40, 0x8}}, @filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x424, 0x2, [@TCA_TCINDEX_FALL_THROUGH={0x8}, @TCA_TCINDEX_POLICE={0x408, 0x6, [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff]}]}, @TCA_TCINDEX_SHIFT={0x8, 0x3, 0x3}, @TCA_TCINDEX_CLASSID={0x8, 0x5, {0xc, 0x3}}]}}]}, 0x48c}, 0x1, 0x0, 0x0, 0x4000800}, 0x4004800) read$hiddev(0xffffffffffffffff, &(0x7f0000000d80)=""/58, 0x3a) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, &(0x7f0000000dc0)={0x1, 0xffffffff, 0x9, 0x0, 0x3, 0x8000}) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf, 0x0, 0x3, 0x296}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001100)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd_index=0x7, 0x0, 0x0, 0x9, 0x0, 0x1}, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:18 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:18 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:18 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:18 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb", 0x16, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r1}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:18 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x484, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@TCA_CHAIN={0x8, 0xb, 0x1}, @filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x14, 0x2, [@TCA_ROUTE4_TO={0x8, 0x2, 0x32}, @TCA_ROUTE4_TO={0x8, 0x2, 0x6b}]}}, @TCA_CHAIN={0x8, 0xb, 0x7}, @TCA_RATE={0x6, 0x5, {0x40, 0x8}}, @filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x41c, 0x2, [@TCA_TCINDEX_POLICE={0x408, 0x6, [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff]}]}, @TCA_TCINDEX_SHIFT={0x8, 0x3, 0x3}, @TCA_TCINDEX_CLASSID={0x8, 0x5, {0xc, 0x3}}]}}]}, 0x484}, 0x1, 0x0, 0x0, 0x4000800}, 0x4004800) read$hiddev(0xffffffffffffffff, &(0x7f0000000d80)=""/58, 0x3a) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, &(0x7f0000000dc0)={0x1, 0xffffffff, 0x9, 0x0, 0x3, 0x8000}) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf, 0x0, 0x3, 0x296}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001100)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd_index=0x7, 0x0, 0x0, 0x9, 0x0, 0x1}, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:18 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00), 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:18 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:18 executing program 0: sendmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) syz_genetlink_get_family_id$batadv(0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d088", 0x3}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b", 0x48, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) bind$can_raw(r1, &(0x7f00000023c0), 0x10) 09:42:18 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x80, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@TCA_CHAIN={0x8, 0xb, 0x1}, @filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x14, 0x2, [@TCA_ROUTE4_TO={0x8, 0x2, 0x32}, @TCA_ROUTE4_TO={0x8, 0x2, 0x6b}]}}, @TCA_CHAIN={0x8, 0xb, 0x7}, @TCA_RATE={0x6, 0x5, {0x40, 0x8}}, @filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x18, 0x2, [@TCA_TCINDEX_POLICE={0x4}, @TCA_TCINDEX_SHIFT={0x8, 0x3, 0x3}, @TCA_TCINDEX_CLASSID={0x8, 0x5, {0xc, 0x3}}]}}]}, 0x80}, 0x1, 0x0, 0x0, 0x4000800}, 0x4004800) read$hiddev(0xffffffffffffffff, &(0x7f0000000d80)=""/58, 0x3a) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, &(0x7f0000000dc0)={0x1, 0xffffffff, 0x9, 0x0, 0x3, 0x8000}) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf, 0x0, 0x3, 0x296}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001100)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd_index=0x7, 0x0, 0x0, 0x9, 0x0, 0x1}, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:18 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:18 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x80, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@TCA_CHAIN={0x8, 0xb, 0x1}, @filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x14, 0x2, [@TCA_ROUTE4_TO={0x8, 0x2, 0x32}, @TCA_ROUTE4_TO={0x8, 0x2, 0x6b}]}}, @TCA_CHAIN={0x8, 0xb, 0x7}, @TCA_RATE={0x6, 0x5, {0x40, 0x8}}, @filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x18, 0x2, [@TCA_TCINDEX_POLICE={0x4}, @TCA_TCINDEX_SHIFT={0x8, 0x3, 0x3}, @TCA_TCINDEX_CLASSID={0x8, 0x5, {0xc, 0x3}}]}}]}, 0x80}, 0x1, 0x0, 0x0, 0x4000800}, 0x4004800) read$hiddev(0xffffffffffffffff, &(0x7f0000000d80)=""/58, 0x3a) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, &(0x7f0000000dc0)={0x1, 0xffffffff, 0x9, 0x0, 0x3, 0x8000}) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf, 0x0, 0x3, 0x296}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001100)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd_index=0x7, 0x0, 0x0, 0x9, 0x0, 0x1}, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:18 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:18 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf", 0x1a, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r1}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:18 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x78, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@TCA_CHAIN={0x8, 0xb, 0x1}, @filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x14, 0x2, [@TCA_ROUTE4_TO={0x8, 0x2, 0x32}, @TCA_ROUTE4_TO={0x8, 0x2, 0x6b}]}}, @TCA_CHAIN={0x8, 0xb, 0x7}, @filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x18, 0x2, [@TCA_TCINDEX_POLICE={0x4}, @TCA_TCINDEX_SHIFT={0x8, 0x3, 0x3}, @TCA_TCINDEX_CLASSID={0x8, 0x5, {0xc, 0x3}}]}}]}, 0x78}, 0x1, 0x0, 0x0, 0x4000800}, 0x4004800) read$hiddev(0xffffffffffffffff, &(0x7f0000000d80)=""/58, 0x3a) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, &(0x7f0000000dc0)={0x1, 0xffffffff, 0x9, 0x0, 0x3, 0x8000}) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf, 0x0, 0x3, 0x296}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001100)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd_index=0x7, 0x0, 0x0, 0x9, 0x0, 0x1}, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:18 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:18 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00), 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:18 executing program 0: sendmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) syz_genetlink_get_family_id$batadv(0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d088", 0x3}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b", 0x48, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) bind$can_raw(r1, &(0x7f00000023c0), 0x10) 09:42:18 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf", 0x1a, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r1}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:18 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:18 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x78, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@TCA_CHAIN={0x8, 0xb, 0x1}, @filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x14, 0x2, [@TCA_ROUTE4_TO={0x8, 0x2, 0x32}, @TCA_ROUTE4_TO={0x8, 0x2, 0x6b}]}}, @TCA_CHAIN={0x8, 0xb, 0x7}, @filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x18, 0x2, [@TCA_TCINDEX_POLICE={0x4}, @TCA_TCINDEX_SHIFT={0x8, 0x3, 0x3}, @TCA_TCINDEX_CLASSID={0x8, 0x5, {0xc, 0x3}}]}}]}, 0x78}, 0x1, 0x0, 0x0, 0x4000800}, 0x4004800) read$hiddev(0xffffffffffffffff, &(0x7f0000000d80)=""/58, 0x3a) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, &(0x7f0000000dc0)={0x1, 0xffffffff, 0x9, 0x0, 0x3, 0x8000}) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf, 0x0, 0x3, 0x296}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001100)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd_index=0x7, 0x0, 0x0, 0x9, 0x0, 0x1}, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:19 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf", 0x1a, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r1}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:19 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:19 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x70, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@TCA_CHAIN={0x8, 0xb, 0x1}, @filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x14, 0x2, [@TCA_ROUTE4_TO={0x8, 0x2, 0x32}, @TCA_ROUTE4_TO={0x8, 0x2, 0x6b}]}}, @TCA_CHAIN={0x8, 0xb, 0x7}, @filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x10, 0x2, [@TCA_TCINDEX_POLICE={0x4}, @TCA_TCINDEX_SHIFT={0x8, 0x3, 0x3}]}}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000800}, 0x4004800) read$hiddev(0xffffffffffffffff, &(0x7f0000000d80)=""/58, 0x3a) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, &(0x7f0000000dc0)={0x1, 0xffffffff, 0x9, 0x0, 0x3, 0x8000}) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf, 0x0, 0x3, 0x296}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001100)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd_index=0x7, 0x0, 0x0, 0x9, 0x0, 0x1}, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:19 executing program 0: sendmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) syz_genetlink_get_family_id$batadv(0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d088", 0x3}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b", 0x48, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) bind$can_raw(r1, &(0x7f00000023c0), 0x10) 09:42:19 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00), 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:19 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:19 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r1}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:19 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x70, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@TCA_CHAIN={0x8, 0xb, 0x1}, @filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x14, 0x2, [@TCA_ROUTE4_TO={0x8, 0x2, 0x32}, @TCA_ROUTE4_TO={0x8, 0x2, 0x6b}]}}, @TCA_CHAIN={0x8, 0xb, 0x7}, @filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x10, 0x2, [@TCA_TCINDEX_POLICE={0x4}, @TCA_TCINDEX_SHIFT={0x8, 0x3, 0x3}]}}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000800}, 0x4004800) read$hiddev(0xffffffffffffffff, &(0x7f0000000d80)=""/58, 0x3a) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, &(0x7f0000000dc0)={0x1, 0xffffffff, 0x9, 0x0, 0x3, 0x8000}) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf, 0x0, 0x3, 0x296}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001100)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd_index=0x7, 0x0, 0x0, 0x9, 0x0, 0x1}, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:19 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:19 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x68, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@TCA_CHAIN={0x8, 0xb, 0x1}, @filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x14, 0x2, [@TCA_ROUTE4_TO={0x8, 0x2, 0x32}, @TCA_ROUTE4_TO={0x8, 0x2, 0x6b}]}}, @TCA_CHAIN={0x8, 0xb, 0x7}, @filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x8, 0x2, [@TCA_TCINDEX_POLICE={0x4}]}}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000800}, 0x4004800) read$hiddev(0xffffffffffffffff, &(0x7f0000000d80)=""/58, 0x3a) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, &(0x7f0000000dc0)={0x1, 0xffffffff, 0x9, 0x0, 0x3, 0x8000}) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf, 0x0, 0x3, 0x296}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001100)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd_index=0x7, 0x0, 0x0, 0x9, 0x0, 0x1}, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:19 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x68, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@TCA_CHAIN={0x8, 0xb, 0x1}, @filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x14, 0x2, [@TCA_ROUTE4_TO={0x8, 0x2, 0x32}, @TCA_ROUTE4_TO={0x8, 0x2, 0x6b}]}}, @TCA_CHAIN={0x8, 0xb, 0x7}, @filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x8, 0x2, [@TCA_TCINDEX_POLICE={0x4}]}}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000800}, 0x4004800) read$hiddev(0xffffffffffffffff, &(0x7f0000000d80)=""/58, 0x3a) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, &(0x7f0000000dc0)={0x1, 0xffffffff, 0x9, 0x0, 0x3, 0x8000}) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf, 0x0, 0x3, 0x296}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001100)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd_index=0x7, 0x0, 0x0, 0x9, 0x0, 0x1}, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:19 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:19 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r1}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:19 executing program 0: sendmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) syz_genetlink_get_family_id$batadv(0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d088", 0x3}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b", 0x48, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) bind$can_raw(r1, &(0x7f00000023c0), 0x10) 09:42:19 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc1", 0x7c, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:19 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:19 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x64, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@TCA_CHAIN={0x8, 0xb, 0x1}, @filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x14, 0x2, [@TCA_ROUTE4_TO={0x8, 0x2, 0x32}, @TCA_ROUTE4_TO={0x8, 0x2, 0x6b}]}}, @TCA_CHAIN={0x8, 0xb, 0x7}, @filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x4}}]}, 0x64}, 0x1, 0x0, 0x0, 0x4000800}, 0x4004800) read$hiddev(0xffffffffffffffff, &(0x7f0000000d80)=""/58, 0x3a) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, &(0x7f0000000dc0)={0x1, 0xffffffff, 0x9, 0x0, 0x3, 0x8000}) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf, 0x0, 0x3, 0x296}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001100)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd_index=0x7, 0x0, 0x0, 0x9, 0x0, 0x1}, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:19 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:19 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x64, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@TCA_CHAIN={0x8, 0xb, 0x1}, @filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x14, 0x2, [@TCA_ROUTE4_TO={0x8, 0x2, 0x32}, @TCA_ROUTE4_TO={0x8, 0x2, 0x6b}]}}, @TCA_CHAIN={0x8, 0xb, 0x7}, @filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x4}}]}, 0x64}, 0x1, 0x0, 0x0, 0x4000800}, 0x4004800) read$hiddev(0xffffffffffffffff, &(0x7f0000000d80)=""/58, 0x3a) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, &(0x7f0000000dc0)={0x1, 0xffffffff, 0x9, 0x0, 0x3, 0x8000}) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf, 0x0, 0x3, 0x296}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001100)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd_index=0x7, 0x0, 0x0, 0x9, 0x0, 0x1}, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:19 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:19 executing program 0: sendmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) syz_genetlink_get_family_id$batadv(0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d088", 0x3}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b", 0x48, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) bind$can_raw(r1, &(0x7f00000023c0), 0x10) 09:42:20 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x64, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@TCA_CHAIN={0x8, 0xb, 0x1}, @filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x14, 0x2, [@TCA_ROUTE4_TO={0x8, 0x2, 0x32}, @TCA_ROUTE4_TO={0x8, 0x2, 0x6b}]}}, @TCA_CHAIN={0x8, 0xb, 0x7}, @filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x4}}]}, 0x64}, 0x1, 0x0, 0x0, 0x4000800}, 0x4004800) read$hiddev(0xffffffffffffffff, &(0x7f0000000d80)=""/58, 0x3a) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, &(0x7f0000000dc0)={0x1, 0xffffffff, 0x9, 0x0, 0x3, 0x8000}) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf, 0x0, 0x3, 0x296}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001100)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd_index=0x7, 0x0, 0x0, 0x9, 0x0, 0x1}, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:20 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf41", 0x1b, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r1}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:20 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc1", 0x7c, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:20 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:20 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x5c, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@TCA_CHAIN={0x8, 0xb, 0x1}, @filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x14, 0x2, [@TCA_ROUTE4_TO={0x8, 0x2, 0x32}, @TCA_ROUTE4_TO={0x8, 0x2, 0x6b}]}}, @filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x4}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000800}, 0x4004800) read$hiddev(0xffffffffffffffff, &(0x7f0000000d80)=""/58, 0x3a) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, &(0x7f0000000dc0)={0x1, 0xffffffff, 0x9, 0x0, 0x3, 0x8000}) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf, 0x0, 0x3, 0x296}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001100)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd_index=0x7, 0x0, 0x0, 0x9, 0x0, 0x1}, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:20 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:20 executing program 0: sendmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) syz_genetlink_get_family_id$batadv(0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d088", 0x3}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b", 0x48, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}]}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) bind$can_raw(r1, &(0x7f00000023c0), 0x10) 09:42:20 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x5c, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@TCA_CHAIN={0x8, 0xb, 0x1}, @filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x14, 0x2, [@TCA_ROUTE4_TO={0x8, 0x2, 0x32}, @TCA_ROUTE4_TO={0x8, 0x2, 0x6b}]}}, @filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x4}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000800}, 0x4004800) read$hiddev(0xffffffffffffffff, &(0x7f0000000d80)=""/58, 0x3a) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, &(0x7f0000000dc0)={0x1, 0xffffffff, 0x9, 0x0, 0x3, 0x8000}) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf, 0x0, 0x3, 0x296}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001100)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd_index=0x7, 0x0, 0x0, 0x9, 0x0, 0x1}, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:20 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf41", 0x1b, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r1}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:20 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:20 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x5c, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@TCA_CHAIN={0x8, 0xb, 0x1}, @filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x14, 0x2, [@TCA_ROUTE4_TO={0x8, 0x2, 0x32}, @TCA_ROUTE4_TO={0x8, 0x2, 0x6b}]}}, @filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x4}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000800}, 0x4004800) read$hiddev(0xffffffffffffffff, &(0x7f0000000d80)=""/58, 0x3a) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, &(0x7f0000000dc0)={0x1, 0xffffffff, 0x9, 0x0, 0x3, 0x8000}) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf, 0x0, 0x3, 0x296}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001100)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd_index=0x7, 0x0, 0x0, 0x9, 0x0, 0x1}, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:20 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc1", 0x7c, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:20 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x3c, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@TCA_CHAIN={0x8, 0xb, 0x1}, @filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x4}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000800}, 0x4004800) read$hiddev(0xffffffffffffffff, &(0x7f0000000d80)=""/58, 0x3a) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, &(0x7f0000000dc0)={0x1, 0xffffffff, 0x9, 0x0, 0x3, 0x8000}) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf, 0x0, 0x3, 0x296}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001100)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd_index=0x7, 0x0, 0x0, 0x9, 0x0, 0x1}, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:20 executing program 0: sendmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) syz_genetlink_get_family_id$batadv(0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d088", 0x3}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b", 0x48, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}]}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) bind$can_raw(r1, &(0x7f00000023c0), 0x10) 09:42:20 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) getsockname(r0, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:20 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x34, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x4}}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000800}, 0x4004800) read$hiddev(0xffffffffffffffff, &(0x7f0000000d80)=""/58, 0x3a) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, &(0x7f0000000dc0)={0x1, 0xffffffff, 0x9, 0x0, 0x3, 0x8000}) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf, 0x0, 0x3, 0x296}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001100)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd_index=0x7, 0x0, 0x0, 0x9, 0x0, 0x1}, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:20 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:20 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf41", 0x1b, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r1}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:20 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f", 0xba, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:20 executing program 0: sendmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) syz_genetlink_get_family_id$batadv(0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d088", 0x3}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b", 0x48, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}]}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) bind$can_raw(r1, &(0x7f00000023c0), 0x10) 09:42:20 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x34, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x4}}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000800}, 0x4004800) read$hiddev(0xffffffffffffffff, &(0x7f0000000d80)=""/58, 0x3a) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, &(0x7f0000000dc0)={0x1, 0xffffffff, 0x9, 0x0, 0x3, 0x8000}) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf, 0x0, 0x3, 0x296}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001100)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd_index=0x7, 0x0, 0x0, 0x9, 0x0, 0x1}, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:20 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockname(r0, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:20 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:21 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r1}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:21 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f", 0xba, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:21 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x34, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x4}}]}, 0x34}}, 0x4004800) read$hiddev(0xffffffffffffffff, &(0x7f0000000d80)=""/58, 0x3a) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, &(0x7f0000000dc0)={0x1, 0xffffffff, 0x9, 0x0, 0x3, 0x8000}) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf, 0x0, 0x3, 0x296}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001100)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd_index=0x7, 0x0, 0x0, 0x9, 0x0, 0x1}, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:21 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockname(r0, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:21 executing program 0: sendmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) syz_genetlink_get_family_id$batadv(0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d088", 0x3}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b", 0x48, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}]}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) bind$can_raw(r1, &(0x7f00000023c0), 0x10) 09:42:21 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x34, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x4}}]}, 0x34}}, 0x4004800) read$hiddev(0xffffffffffffffff, &(0x7f0000000d80)=""/58, 0x3a) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, &(0x7f0000000dc0)={0x1, 0xffffffff, 0x9, 0x0, 0x3, 0x8000}) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf, 0x0, 0x3, 0x296}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001100)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd_index=0x7, 0x0, 0x0, 0x9, 0x0, 0x1}, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:21 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x8, 0x10000) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:21 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r1}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:21 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f", 0xba, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:21 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x34, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x4}}]}, 0x34}}, 0x4004800) read$hiddev(0xffffffffffffffff, &(0x7f0000000d80)=""/58, 0x3a) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, &(0x7f0000000dc0)={0x1, 0xffffffff, 0x9, 0x0, 0x3, 0x8000}) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf, 0x0, 0x3, 0x296}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001100)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd_index=0x7, 0x0, 0x0, 0x9, 0x0, 0x1}, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:21 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:21 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x34, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x4}}]}, 0x34}}, 0x0) read$hiddev(0xffffffffffffffff, &(0x7f0000000d80)=""/58, 0x3a) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, &(0x7f0000000dc0)={0x1, 0xffffffff, 0x9, 0x0, 0x3, 0x8000}) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf, 0x0, 0x3, 0x296}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001100)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd_index=0x7, 0x0, 0x0, 0x9, 0x0, 0x1}, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:21 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x10000) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:21 executing program 0: sendmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) syz_genetlink_get_family_id$batadv(0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d088", 0x3}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b", 0x48, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}]}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) bind$can_raw(r1, &(0x7f00000023c0), 0x10) 09:42:21 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x34, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x4}}]}, 0x34}}, 0x0) read$hiddev(0xffffffffffffffff, 0x0, 0x0) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, &(0x7f0000000dc0)={0x1, 0xffffffff, 0x9, 0x0, 0x3, 0x8000}) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf, 0x0, 0x3, 0x296}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001100)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd_index=0x7, 0x0, 0x0, 0x9, 0x0, 0x1}, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:21 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x10000) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:21 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200", 0xd9, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:21 executing program 0: sendmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) syz_genetlink_get_family_id$batadv(0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d088", 0x3}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b", 0x48, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}]}) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x1000, 0x0) bind$can_raw(r1, &(0x7f00000023c0), 0x10) 09:42:21 executing program 3: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:22 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r1}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:22 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x34, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x4}}]}, 0x34}}, 0x0) read$hiddev(0xffffffffffffffff, 0x0, 0x0) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, 0x0) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf, 0x0, 0x3, 0x296}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001100)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd_index=0x7, 0x0, 0x0, 0x9, 0x0, 0x1}, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:22 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x10000) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:22 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x34, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x4}}]}, 0x34}}, 0x0) read$hiddev(0xffffffffffffffff, 0x0, 0x0) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, 0x0) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x0, &(0x7f0000000e00)={0x0, 0x40bf, 0x0, 0x3, 0x296}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001100)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd_index=0x7, 0x0, 0x0, 0x9, 0x0, 0x1}, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:22 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x34, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x4}}]}, 0x34}}, 0x0) read$hiddev(0xffffffffffffffff, 0x0, 0x0) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, 0x0) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x0, &(0x7f0000000e00)={0x0, 0x40bf, 0x0, 0x3, 0x296}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001100)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd_index=0x7, 0x0, 0x0, 0x9, 0x0, 0x1}, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:22 executing program 0: sendmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) syz_genetlink_get_family_id$batadv(0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d088", 0x3}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b", 0x48, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}]}) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x1000, 0x0) bind$can_raw(r1, &(0x7f00000023c0), 0x10) 09:42:22 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x34, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x4}}]}, 0x34}}, 0x0) read$hiddev(0xffffffffffffffff, 0x0, 0x0) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, 0x0) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x0, &(0x7f0000000e00)={0x0, 0x40bf, 0x0, 0x3, 0x296}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001100)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd_index=0x7, 0x0, 0x0, 0x9, 0x0, 0x1}, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:22 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200", 0xd9, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:22 executing program 3: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:22 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r1}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:22 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x34, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x4}}]}, 0x34}}, 0x0) read$hiddev(0xffffffffffffffff, 0x0, 0x0) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, 0x0) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001100)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd_index=0x7, 0x0, 0x0, 0x9, 0x0, 0x1}, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:22 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:22 executing program 0: sendmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) syz_genetlink_get_family_id$batadv(0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d088", 0x3}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b", 0x48, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}]}) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$can_raw(r1, &(0x7f00000023c0), 0x10) 09:42:22 executing program 3: getsockname(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:22 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x34, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x4}}]}, 0x34}}, 0x0) read$hiddev(0xffffffffffffffff, 0x0, 0x0) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, 0x0) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001100)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd_index=0x7, 0x0, 0x0, 0x9, 0x0, 0x1}, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:22 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x34, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x4}}]}, 0x34}}, 0x0) read$hiddev(0xffffffffffffffff, 0x0, 0x0) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, 0x0) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001100)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd_index=0x7, 0x0, 0x0, 0x9, 0x0, 0x1}, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) [ 222.789919][T27030] ntfs: (device loop1): parse_options(): Unrecognized mount option smackfsdef. [ 222.800256][T27030] ntfs: (device loop1): parse_options(): Unrecognized mount option rootcontext. [ 222.809417][T27030] ntfs: (device loop1): parse_options(): Unrecognized mount option func. [ 222.818025][T27030] ntfs: (device loop1): parse_options(): Unrecognized mount option . 09:42:22 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x34, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x4}}]}, 0x34}}, 0x0) read$hiddev(0xffffffffffffffff, 0x0, 0x0) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, 0x0) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x3, 0x296}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001100)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd_index=0x7, 0x0, 0x0, 0x9, 0x0, 0x1}, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:22 executing program 0: sendmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) syz_genetlink_get_family_id$batadv(0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d088", 0x3}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b", 0x48, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}]}) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$can_raw(r1, &(0x7f00000023c0), 0x10) 09:42:22 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:22 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200", 0xd9, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:22 executing program 3: getsockname(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:22 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r1}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:22 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x34, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x4}}]}, 0x34}}, 0x0) read$hiddev(0xffffffffffffffff, 0x0, 0x0) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, 0x0) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x3, 0x296}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001100)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd_index=0x7, 0x0, 0x0, 0x9, 0x0, 0x1}, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:23 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:23 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x34, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x4}}]}, 0x34}}, 0x0) read$hiddev(0xffffffffffffffff, 0x0, 0x0) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, 0x0) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x3, 0x296}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001100)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd_index=0x7, 0x0, 0x0, 0x9, 0x0, 0x1}, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) [ 223.179170][T27076] ntfs: (device loop1): parse_options(): Unrecognized mount option smackfsdef. [ 223.197896][T27076] ntfs: (device loop1): parse_options(): Unrecognized mount option rootcontext. [ 223.218032][T27076] ntfs: (device loop1): parse_options(): Unrecognized mount option func. [ 223.236515][T27076] ntfs: (device loop1): parse_options(): Unrecognized mount option . 09:42:23 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r1}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:23 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:23 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:23 executing program 0: sendmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) syz_genetlink_get_family_id$batadv(0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d088", 0x3}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b", 0x48, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}]}) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$can_raw(r1, &(0x7f00000023c0), 0x10) 09:42:23 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba", 0xe8, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:23 executing program 3: getsockname(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:23 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x34, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x4}}]}, 0x34}}, 0x0) read$hiddev(0xffffffffffffffff, 0x0, 0x0) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, 0x0) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf, 0x0, 0x0, 0x296}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001100)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd_index=0x7, 0x0, 0x0, 0x9, 0x0, 0x1}, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:23 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x34, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x4}}]}, 0x34}}, 0x0) read$hiddev(0xffffffffffffffff, 0x0, 0x0) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, 0x0) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001100)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd_index=0x7, 0x0, 0x0, 0x9, 0x0, 0x1}, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:23 executing program 3: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, 0x0, 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:23 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:23 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:23 executing program 0: sendmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) syz_genetlink_get_family_id$batadv(0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d088", 0x3}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b", 0x48, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}]}) openat$autofs(0xffffffffffffff9c, 0x0, 0x1000, 0x0) bind$can_raw(0xffffffffffffffff, &(0x7f00000023c0), 0x10) 09:42:23 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba", 0xe8, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:23 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:23 executing program 0: sendmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) syz_genetlink_get_family_id$batadv(0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d088", 0x3}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b", 0x48, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}]}) openat$autofs(0xffffffffffffff9c, 0x0, 0x1000, 0x0) bind$can_raw(0xffffffffffffffff, &(0x7f00000023c0), 0x10) 09:42:23 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x34, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x4}}]}, 0x34}}, 0x0) read$hiddev(0xffffffffffffffff, 0x0, 0x0) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, 0x0) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf}) syz_io_uring_submit(0x0, 0x0, 0x0, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:23 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x34, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x4}}]}, 0x34}}, 0x0) read$hiddev(0xffffffffffffffff, 0x0, 0x0) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, 0x0) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf}) syz_io_uring_submit(0x0, 0x0, 0x0, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:23 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:23 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba", 0xe8, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:24 executing program 0: sendmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) syz_genetlink_get_family_id$batadv(0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d088", 0x3}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b", 0x48, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}]}) openat$autofs(0xffffffffffffff9c, 0x0, 0x1000, 0x0) bind$can_raw(0xffffffffffffffff, &(0x7f00000023c0), 0x10) 09:42:24 executing program 3: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, 0x0, 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:24 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:24 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x34, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x4}}]}, 0x34}}, 0x0) read$hiddev(0xffffffffffffffff, 0x0, 0x0) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, 0x0) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf}) syz_io_uring_submit(0x0, 0x0, 0x0, 0xfce2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:24 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x0, 0x0, 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:24 executing program 0: sendmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) syz_genetlink_get_family_id$batadv(0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d088", 0x3}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b", 0x48, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}]}) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x1000, 0x0) bind$can_raw(r1, 0x0, 0x0) 09:42:24 executing program 3: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, 0x0, 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:24 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef426", 0xf0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:24 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:24 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x0, 0x0, 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:24 executing program 3: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:24 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x34, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x4}}]}, 0x34}}, 0x0) read$hiddev(0xffffffffffffffff, 0x0, 0x0) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, 0x0) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf}) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:24 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x0, 0x0, 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:24 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:24 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:24 executing program 3: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x0, 0x0, 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:24 executing program 0: sendmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) syz_genetlink_get_family_id$batadv(0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d088", 0x3}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b", 0x48, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}]}) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x1000, 0x0) bind$can_raw(r1, 0x0, 0x0) 09:42:24 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x34, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x4}}]}, 0x34}}, 0x0) read$hiddev(0xffffffffffffffff, 0x0, 0x0) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, 0x0) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf}) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:24 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef426", 0xf0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:24 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:24 executing program 3: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x0, 0x0, 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:24 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x34, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x4}}]}, 0x34}}, 0x0) read$hiddev(0xffffffffffffffff, 0x0, 0x0) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, 0x0) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf}) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:24 executing program 3: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x0, 0x0, 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:24 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:24 executing program 3: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:25 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x34, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x4}}]}, 0x34}}, 0x0) read$hiddev(0xffffffffffffffff, 0x0, 0x0) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, 0x0) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf}) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x137ab000) 09:42:25 executing program 0: sendmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) syz_genetlink_get_family_id$batadv(0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d088", 0x3}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b", 0x48, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}]}) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x1000, 0x0) bind$can_raw(r1, 0x0, 0x0) 09:42:25 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:25 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef426", 0xf0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:25 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x34, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x4}}]}, 0x34}}, 0x0) read$hiddev(0xffffffffffffffff, 0x0, 0x0) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, 0x0) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf}) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x0, 0x100010, r0, 0x137ab000) 09:42:25 executing program 3: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:25 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x34, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x4}}]}, 0x34}}, 0x0) read$hiddev(0xffffffffffffffff, 0x0, 0x0) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, 0x0) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf}) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x0, 0x100010, r0, 0x137ab000) 09:42:25 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:25 executing program 0: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x34, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x4}}]}, 0x34}}, 0x0) read$hiddev(0xffffffffffffffff, 0x0, 0x0) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, 0x0) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf}) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x0, 0x100010, r0, 0x137ab000) 09:42:25 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:25 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x34, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x4}}]}, 0x34}}, 0x0) read$hiddev(0xffffffffffffffff, 0x0, 0x0) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, 0x0) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf}) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x0, 0x100010, r0, 0x137ab000) 09:42:25 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc", 0xf4, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:25 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:25 executing program 3: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:25 executing program 0: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x34, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x4}}]}, 0x34}}, 0x0) read$hiddev(0xffffffffffffffff, 0x0, 0x0) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, 0x0) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf}) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x0, 0x100010, r0, 0x137ab000) 09:42:25 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x34, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x4}}]}, 0x34}}, 0x0) read$hiddev(0xffffffffffffffff, 0x0, 0x0) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, 0x0) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf}) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x10, r0, 0x137ab000) 09:42:25 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:25 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x34, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x4}}]}, 0x34}}, 0x0) read$hiddev(0xffffffffffffffff, 0x0, 0x0) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, 0x0) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf}) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x10, 0xffffffffffffffff, 0x137ab000) 09:42:25 executing program 0: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:25 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc", 0xf4, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:25 executing program 3: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:25 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:26 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x34, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x4}}]}, 0x34}}, 0x0) read$hiddev(0xffffffffffffffff, 0x0, 0x0) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, 0x0) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf}) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x10, 0xffffffffffffffff, 0x137ab000) 09:42:26 executing program 0: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:26 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:26 executing program 0: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:26 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x34, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x4}}]}, 0x34}}, 0x0) read$hiddev(0xffffffffffffffff, 0x0, 0x0) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, 0x0) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf}) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) 09:42:26 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:26 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc", 0xf4, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:26 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000040)=@deltfilter={0x34, 0x2d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x11, 0xc}, {0xfff2, 0x6}, {0xfff1, 0x9}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x4}}]}, 0x34}}, 0x0) read$hiddev(0xffffffffffffffff, 0x0, 0x0) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, 0x0) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x5155, &(0x7f0000000e00)={0x0, 0x40bf}) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000d3a000/0x2000)=nil, 0x2000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) 09:42:26 executing program 3: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:26 executing program 0: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:26 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00), 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:26 executing program 2: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:26 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00), 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:26 executing program 2: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:26 executing program 3: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:26 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a57", 0xf6, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:26 executing program 2: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:26 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:26 executing program 0: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:27 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00), 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:27 executing program 0: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:27 executing program 2: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:27 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a57", 0xf6, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:27 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc1", 0x7c, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:27 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:27 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a57", 0xf6, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:27 executing program 3: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00), 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:27 executing program 2: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:27 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc1", 0x7c, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:27 executing program 0: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:27 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask'}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:27 executing program 2: syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:27 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:27 executing program 0: syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:27 executing program 3: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00), 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:27 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc1", 0x7c, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:28 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:28 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:28 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask'}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:28 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:28 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f", 0xba, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:28 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:28 executing program 3: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00), 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:28 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:28 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:28 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f", 0xba, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:28 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:28 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask'}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:28 executing program 3: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc1", 0x7c, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:28 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:28 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:28 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:29 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:29 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f", 0xba, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:29 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:29 executing program 3: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc1", 0x7c, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:29 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:29 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:29 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118", 0x7d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:29 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:29 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@fmask={'fmask'}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:29 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:29 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:29 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:29 executing program 3: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)='?', 0x1, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:29 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:29 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:29 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:29 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118", 0x7d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:30 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {0x0}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:30 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@fmask={'fmask'}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:30 executing program 3: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)='?', 0x1, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:30 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:30 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa24941", 0x40, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:30 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:30 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {0x0}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:30 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@fmask={'fmask'}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:30 executing program 3: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)='?', 0x1, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:30 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {0x0}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:30 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {0x0}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:30 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa24941", 0x40, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:30 executing program 3: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249", 0x3f, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:30 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:30 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:30 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:30 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa24941", 0x40, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:31 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {0x0}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:31 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:31 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)='?_\b', 0x3, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:31 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:31 executing program 3: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)='?_', 0x2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:31 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {0x0}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:31 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:31 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:31 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0), 0x0, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:31 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:31 executing program 3: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)='?_', 0x2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:31 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)='?_\b', 0x3, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:32 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0), 0x0, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:32 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:32 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:32 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:32 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)='?_\b', 0x3, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:32 executing program 3: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)='?_', 0x2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:32 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:32 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:32 executing program 3: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)='?', 0x1, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:32 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0), 0x0, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:32 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:32 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:32 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692", 0x22, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:32 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43", 0xf, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:32 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:32 executing program 3: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)='?', 0x1, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:32 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:33 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:33 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)='?_\be', 0x4, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:33 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:33 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43", 0xf, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:33 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0), 0x0, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:33 executing program 3: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)='?', 0x1, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:33 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:33 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:33 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)='?_\be', 0x4, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:33 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43", 0xf, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:33 executing program 3: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)='?_', 0x2}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:33 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0), 0x0, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:34 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:34 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb", 0x16, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:34 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0), 0x0, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:34 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)='?_\be', 0x4, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:34 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0), 0x0, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:34 executing program 3: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)='?_', 0x2}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:34 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:34 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb", 0x16, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:34 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0), 0x0, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:34 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43", 0xf, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:34 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f", 0x13, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:34 executing program 3: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)='?_', 0x2}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:34 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:34 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f", 0x13, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:34 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0), 0x0, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:34 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid', 0x3d, r0}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:35 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb", 0x16, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:35 executing program 3: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001d00)='?_', 0x2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:35 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0), 0x0, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:35 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f", 0x13, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:35 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43", 0xf, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:35 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid', 0x3d, r0}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:35 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf", 0x1a, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:35 executing program 3: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001d00)='?_', 0x2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:35 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6", 0x1b, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:35 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43", 0xf, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:35 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0), 0x0, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:35 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid', 0x3d, r0}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:35 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf", 0x1a, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:36 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0), 0x0, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:36 executing program 3: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001d00)='?_', 0x2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:36 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6", 0x1b, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:36 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:36 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:36 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf", 0x1a, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:36 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:36 executing program 3: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {&(0x7f0000001d00)='?_', 0x2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:36 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6", 0x1b, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:36 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0), 0x0, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:36 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:36 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:37 executing program 3: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {&(0x7f0000001d00)='?_', 0x2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:37 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d", 0x1f, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:37 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0), 0x0, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:37 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:37 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:37 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:37 executing program 3: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {&(0x7f0000001d00)='?_', 0x2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:37 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d", 0x1f, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:37 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:37 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0), 0x0, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:37 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:37 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:37 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce", 0x1c, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:38 executing program 3: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0), 0x0, 0x6}, {&(0x7f0000001d00)='?_', 0x2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:38 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:38 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:38 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:38 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:38 executing program 3: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0), 0x0, 0x6}, {&(0x7f0000001d00)='?_', 0x2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:38 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:38 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce", 0x1c, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:38 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:38 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:38 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x0, 0x0) 09:42:38 executing program 3: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0), 0x0, 0x6}, {&(0x7f0000001d00)='?_', 0x2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:38 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:39 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:39 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce", 0x1c, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:39 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:39 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:39 executing program 3: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43", 0xf, 0x6}, {&(0x7f0000001d00)='?_', 0x2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:39 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:39 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:39 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:39 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:39 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff5", 0x1e, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:39 executing program 3: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)='?_', 0x2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:39 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x0, 0x0) [ 239.793639][T28231] ntfs: (device loop5): parse_options(): Invalid uid option argument: 0x00000000ffffffff 09:42:39 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:39 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:39 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:39 executing program 3: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0), 0x0, 0x6}, {&(0x7f0000001d00)='?_', 0x2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:39 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:40 executing program 0: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)='?_', 0x2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) [ 240.266068][T28264] ntfs: (device loop5): parse_options(): Invalid uid option argument: 0x00000000ffffffff 09:42:40 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:40 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:40 executing program 0: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)='?_', 0x2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:40 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:40 executing program 3: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0), 0x0, 0x6}, {&(0x7f0000001d00)='?_', 0x2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:40 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce", 0x1c, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:40 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:40 executing program 0: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)='?_', 0x2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) [ 240.673239][T28292] ntfs: (device loop5): parse_options(): Invalid uid option argument: 0x00000000ffffffff 09:42:40 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:40 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:40 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, 0x0) 09:42:40 executing program 3: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0), 0x0, 0x6}, {&(0x7f0000001d00)='?_', 0x2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:40 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce", 0x1c, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:40 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:41 executing program 0: syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)='?_', 0x2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:41 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000001e00), 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:41 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, 0x0) 09:42:41 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce", 0x1c, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:41 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/autofs\x00', 0x1000, 0x0) 09:42:41 executing program 3: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1}, {&(0x7f0000001d00)='?_', 0x2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:41 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)='?_', 0x2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:41 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000001e00), 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:41 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, 0x0) 09:42:41 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:41 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, 0x0, 0x1000, 0x0) 09:42:41 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:41 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000001e00), 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:41 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:41 executing program 3: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1}, {&(0x7f0000001d00)='?_', 0x2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:42 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:42 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:42 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:42 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, 0x0, 0x1000, 0x0) 09:42:42 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{0x0}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:42 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:42 executing program 3: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1}, {&(0x7f0000001d00)='?_', 0x2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:42 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:42 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, 0x0, 0x1000, 0x0) 09:42:42 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:42 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:42 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{0x0}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:42 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:42 executing program 3: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)='?_', 0x2, 0x7fffffff}], 0x0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:43 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:43 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 09:42:43 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:43 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{0x0}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:43 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:43 executing program 3: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)='?_', 0x2, 0x7fffffff}], 0x0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:43 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:43 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 09:42:43 executing program 3: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)='?_', 0x2, 0x7fffffff}], 0x0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:43 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:43 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:43 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001cc0)}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:43 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001cc0)}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:43 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001900), 0x10, &(0x7f00000019c0)={&(0x7f0000001940)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0xe, 0x2, 0x0, 0x0, "ce93246571d7534e9dad2c49023a3a8a51f4aa22950324119c9c78109affc9e5d48a9c23364e8226d169451fc763d4e0ab7f3c800c548517f944ebbec2cd1851"}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000001b40)=0x80) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001b80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416f", 0x1c}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce", 0xd2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 09:42:43 executing program 3: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)='?_', 0x2, 0x7fffffff}], 0x22a70b0, 0x0) 09:42:44 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:44 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:44 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:44 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001cc0)}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:44 executing program 3: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:44 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:44 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:44 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:44 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1}], 0x0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:44 executing program 1: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001cc0)}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:44 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00), 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:44 executing program 3: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:44 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1}], 0x0, 0x0) 09:42:45 executing program 1: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001cc0)}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:45 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:45 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:45 executing program 3: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:45 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1}], 0x0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:45 executing program 1: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001cc0)}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:45 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00), 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:45 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0), 0x0, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:45 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:45 executing program 1: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:45 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1}], 0x0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:45 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:45 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0), 0x0, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:45 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00), 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:46 executing program 1: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:46 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:46 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:46 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0), 0x0, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:46 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)='?', 0x1, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:46 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1}], 0x0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:46 executing program 1: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:46 executing program 1: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000001e00), 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:46 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:46 executing program 1: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000001e00), 0x0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:46 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)='?', 0x1, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:46 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:46 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43", 0xf, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:46 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:46 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:46 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)='?', 0x1, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:47 executing program 1: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000001e00), 0x0, 0x0) 09:42:47 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:47 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:47 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:47 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000001e00), 0x0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:47 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)='?_', 0x2}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:47 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:47 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:47 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:47 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000001e00), 0x0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:47 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)='?_', 0x2}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:47 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:47 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000001e00), 0x0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:47 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:47 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:47 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)='?_', 0x2}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:48 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:48 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{0x0}], 0x0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:48 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:48 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask'}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:48 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0), 0x0, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:48 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001d00)='?_', 0x2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:48 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:48 executing program 3: remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:48 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{0x0}], 0x0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:48 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0), 0x0, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:48 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001d00)='?_', 0x2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:48 executing program 3: remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:48 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask'}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:48 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) 09:42:48 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0), 0x0, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:48 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') 09:42:48 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{0x0}], 0x0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:49 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask'}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:49 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001d00)='?_', 0x2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:49 executing program 3: remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:49 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 09:42:49 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001cc0)}], 0x0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:49 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:49 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) 09:42:49 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {&(0x7f0000001d00)='?_', 0x2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:49 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) 09:42:49 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) 09:42:49 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001cc0)}], 0x0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:49 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:49 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:49 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:49 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) 09:42:49 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) 09:42:49 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {&(0x7f0000001d00)='?_', 0x2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:50 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:50 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:50 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) 09:42:50 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:50 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) 09:42:50 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001cc0)}], 0x0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:50 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:50 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) 09:42:50 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:50 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:50 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {&(0x7f0000001d00)='?_', 0x2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:50 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) 09:42:50 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:50 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1}], 0x0, 0x0) 09:42:50 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:50 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:50 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0), 0x0, 0x6}, {&(0x7f0000001d00)='?_', 0x2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:50 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) 09:42:51 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) 09:42:51 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001cc0)}], 0x0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:51 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:51 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:51 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0), 0x0, 0x6}, {&(0x7f0000001d00)='?_', 0x2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:51 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:51 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0), 0x0, 0x6}, {&(0x7f0000001d00)='?_', 0x2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:51 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:51 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000001a80)) 09:42:51 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0), 0x0, 0x6}, {&(0x7f0000001d00)='?_', 0x2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:51 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1}, {&(0x7f0000001d00)='?_', 0x2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:51 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:51 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) 09:42:51 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) 09:42:51 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, 0x0) 09:42:51 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1}, {&(0x7f0000001d00)='?_', 0x2, 0x7fffffff}], 0x0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:51 executing program 2: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:51 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1}, {&(0x7f0000001d00)='?_', 0x2, 0x7fffffff}], 0x0, 0x0) 09:42:51 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:51 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:51 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) 09:42:51 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:51 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:52 executing program 2: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:52 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, 0x0) 09:42:52 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:52 executing program 0: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:52 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:52 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:52 executing program 2: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:52 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, 0x0) 09:42:52 executing program 0: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:52 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:52 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:52 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:52 executing program 0: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:52 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:52 executing program 2: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:52 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:52 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:52 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:52 executing program 0: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:53 executing program 2: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:53 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:53 executing program 0: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:53 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:53 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:53 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:53 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:53 executing program 0: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:53 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:53 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:53 executing program 2: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:53 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:53 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:53 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:53 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:54 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:54 executing program 2: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:54 executing program 0: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:54 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {&(0x7f0000001d00), 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:54 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:54 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:54 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {&(0x7f0000001d00), 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:54 executing program 0: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:54 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:54 executing program 2: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:54 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:54 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {&(0x7f0000001d00), 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:54 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:54 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:54 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:55 executing program 2: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:55 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea6", 0xf, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:55 executing program 0: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:55 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:55 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:55 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:55 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {&(0x7f0000001d00)='?', 0x1, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:55 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:55 executing program 2: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:55 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:55 executing program 0: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:55 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:55 executing program 2: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:55 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:55 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {&(0x7f0000001d00)='?', 0x1, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:55 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:55 executing program 0: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:55 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask'}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:56 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:56 executing program 2: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:56 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {&(0x7f0000001d00)='?', 0x1, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:56 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:56 executing program 0: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:56 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:56 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:56 executing program 2: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:56 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:56 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {&(0x7f0000001d00)='?_\beL()Z', 0x8, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:56 executing program 0: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:56 executing program 2: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:56 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:56 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:56 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {&(0x7f0000001d00)='?', 0x1, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:57 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:57 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:57 executing program 0: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:57 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}) 09:42:57 executing program 2: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:57 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {&(0x7f0000001d00)='?', 0x1, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:57 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:57 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}) 09:42:57 executing program 0: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:57 executing program 2: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:57 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:57 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask'}}, {@fmask={'fmask'}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:57 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {&(0x7f0000001d00)='?', 0x1, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:58 executing program 2: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:58 executing program 0: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) 09:42:58 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}) 09:42:58 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:58 executing program 0: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) 09:42:58 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {&(0x7f0000001d00)='?_\beL', 0x5, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:58 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask'}}, {@fmask={'fmask'}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:58 executing program 2: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:58 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:58 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:58 executing program 0: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) 09:42:58 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {&(0x7f0000001d00)='?_\beL', 0x5, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:58 executing program 0: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) 09:42:58 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask'}}, {@fmask={'fmask'}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:58 executing program 0: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) 09:42:58 executing program 2: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:58 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:59 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {&(0x7f0000001d00)='?_', 0x2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:59 executing program 0: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) 09:42:59 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:59 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask'}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:59 executing program 0: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) 09:42:59 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {&(0x7f0000001d00)='?', 0x1, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:59 executing program 2: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:59 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:59 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) 09:42:59 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:59 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@umask={'umask'}}, {@fmask={'fmask'}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:59 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) 09:42:59 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:59 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) 09:42:59 executing program 2: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:59 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:59 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {&(0x7f0000001d00)='?', 0x1, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:42:59 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) 09:42:59 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@umask={'umask'}}, {@fmask={'fmask'}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:00 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:00 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000001a80)) 09:43:00 executing program 2: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:00 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:00 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {&(0x7f0000001d00)='?', 0x1, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:00 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) 09:43:00 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) 09:43:00 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:00 executing program 2: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) socket$inet_tcp(0x2, 0x1, 0x0) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:00 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) 09:43:00 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@umask={'umask'}}, {@fmask={'fmask'}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:00 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {&(0x7f0000001d00)='?_', 0x2}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:00 executing program 0: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@umask={'umask'}}, {@fmask={'fmask'}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:00 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:00 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:00 executing program 2: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) socket$inet_tcp(0x2, 0x1, 0x0) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:00 executing program 0: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:00 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:00 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask'}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:00 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {&(0x7f0000001d00)='?_', 0x2}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:00 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:00 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:01 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:01 executing program 0: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@umask={'umask'}}, {@fmask={'fmask'}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:01 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@umask={'umask'}}, {@fmask={'fmask'}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:01 executing program 2: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) socket$inet_tcp(0x2, 0x1, 0x0) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:01 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) socket$inet_tcp(0x2, 0x1, 0x0) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:01 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {&(0x7f0000001d00)='?_', 0x2}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:01 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:01 executing program 0: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@umask={'umask'}}, {@fmask={'fmask'}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:01 executing program 2: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r1}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:01 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@umask={'umask'}}, {@fmask={'fmask'}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:01 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) socket$inet_tcp(0x2, 0x1, 0x0) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:01 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:02 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001d00)='?_', 0x2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:02 executing program 0: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@umask={'umask'}}, {@fmask={'fmask'}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:02 executing program 2: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r1}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:02 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@umask={'umask'}}, {@fmask={'fmask'}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:02 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) socket$inet_tcp(0x2, 0x1, 0x0) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:02 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001d00)='?_', 0x2, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:02 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r1}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:02 executing program 0: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r1}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:02 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:02 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask'}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:02 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:02 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r1}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:02 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:02 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:02 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask'}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:03 executing program 0: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:03 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:03 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:03 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r1}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:03 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask'}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:03 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:03 executing program 0: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:03 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{0x0, 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:03 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@umask={'umask'}}, {@fmask={'fmask'}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:03 executing program 2: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r1}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:03 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {0x0}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:03 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask'}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}) 09:43:03 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@umask={'umask'}}, {@fmask={'fmask'}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:04 executing program 2: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001a80)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:04 executing program 0: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask'}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:04 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001d00), 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:04 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask'}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}) 09:43:04 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {0x0}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:04 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {0x0}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:04 executing program 0: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask'}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}) 09:43:04 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask'}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}) 09:43:04 executing program 2: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001a80)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:04 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{0x0}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:04 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001d00), 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:04 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:04 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{0x0}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:04 executing program 2: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001a80)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:04 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask'}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}]}) 09:43:04 executing program 0: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask'}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}) 09:43:05 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001d00), 0x0, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:05 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:05 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{0x0}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:05 executing program 2: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:05 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {0x0}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:05 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask'}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}]}) 09:43:05 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{0x0}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:05 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001d00)='?', 0x1, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:05 executing program 0: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001a80)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:05 executing program 2: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:05 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {0x0}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:05 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask'}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}]}) 09:43:06 executing program 2: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:06 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001d00)='?', 0x1, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:06 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:06 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {0x0}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:06 executing program 2: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:06 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask'}}, {@errors_remount='errors=remount-ro'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}]}) 09:43:06 executing program 0: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {0x0}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:06 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {0x0}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:06 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001d00)='?', 0x1, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:06 executing program 2: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:06 executing program 0: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {0x0}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:06 executing program 2: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:06 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0), 0x0, 0x6}, {0x0}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:06 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask'}}, {@errors_remount='errors=remount-ro'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}]}) 09:43:07 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask'}}, {@errors_remount='errors=remount-ro'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}]}) 09:43:07 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001d00)='?_', 0x2}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:07 executing program 2: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:07 executing program 0: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {0x0}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:07 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask'}}, {@errors_remount='errors=remount-ro'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}]}) 09:43:07 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001d00)='?', 0x1, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:07 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0), 0x0, 0x6}, {0x0}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:07 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001d00)='?_', 0x2}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:07 executing program 2: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:07 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:07 executing program 0: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {0x0}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:07 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:08 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001d00)='?_', 0x2}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:08 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{0x0}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:08 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0), 0x0, 0x6}, {0x0}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:08 executing program 2: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', 0x0, 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:08 executing program 0: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {0x0}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:08 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:08 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:08 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1}, {0x0}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:08 executing program 0: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0), 0x0, 0x6}, {0x0}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:08 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001d00)='?_', 0x2, 0x7fffffff}], 0x0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:08 executing program 2: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:08 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0), 0x0, 0x6}, {0x0}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:09 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000001b40)) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000001c00)='batadv\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x8, 0x10000) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:09 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1}, {0x0}], 0x0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:09 executing program 0: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask'}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:09 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001d00)='?_', 0x2, 0x7fffffff}], 0x0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:09 executing program 2: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', 0x0, 0x0, 0x0, 0x0, 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:09 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1}, {0x0}], 0x0, 0x0) 09:43:09 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1}, {0x0}], 0x0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:09 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:09 executing program 0: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask'}}, {@fmask={'fmask'}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:09 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001d00)='?_', 0x2, 0x7fffffff}], 0x0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:09 executing program 2: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', 0x0, 0x0, 0x0, 0x0, 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:09 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1}, {0x0}], 0x0, 0x0) 09:43:10 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1}, {0x0}], 0x0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:10 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:10 executing program 2: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', 0x0, 0x0, 0x0, 0x0, 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:10 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001d00)='?_', 0x2, 0x7fffffff}], 0x22a70b0, 0x0) 09:43:10 executing program 0: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001d00)='?_', 0x2, 0x7fffffff}], 0x0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:10 executing program 2: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:10 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1}, {0x0}], 0x0, 0x0) 09:43:10 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:10 executing program 4: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1}, {0x0}], 0x0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:10 executing program 0: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', &(0x7f0000001840)={'tunl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x2, 0x25, 0x40, 0x66, 0x0, 0x8, 0x2f, 0x0, @local, @loopback, {[@generic={0x94, 0xe, "99239e6c4dbdf6015ad37c3e"}, @timestamp_prespec={0x44, 0xc, 0xd0, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xfff}]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x9, [0x4, 0xab, 0x7]}]}}}}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', &(0x7f0000001c80)='./file0\x00', 0xfffffffffffffbb4, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7ff57d8da692ea208b19db275f0bfd7a1dead7314517e58cae7dd881e5fbe40b3fa249416530f9f828df5a0b9bbf98ba4d0e6a04fd76c323039593a3f43a82908c55da714c136beed1e57e232253ba6d77353cac91a758e8ba8d9bad7318bbc118f925a234dc893bcace3f5949bcf3985b23d269e701a32ba6f3525cf1acb6a3fcefff3f001ff6e0a1ff276275d9b2d8f8458185cf627f2605f6b9e36c4f010777c4d7f669c640659eec931e69bb8dabd49dd2ebc5ce4ab270dca8a200f984765bb3e668b63a7529bcc39cba6e1e0e9235fef42695efe1fc4a5799", 0xf7, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, r1}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid', 0x3d, r2}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:10 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001cc0)='d', 0x1, 0x6}, {&(0x7f0000001d00)="3f5f08654c28295a0cbf4fe364aea686b8d53f7bd6ad6c919159e6ce7f", 0x1d, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask'}}, {@fmask={'fmask'}}, {@errors_remount='errors=remount-ro'}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:10 executing program 2: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000001c40)='ntfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="64d08829a1240648fcc68c31e6fe43d31dcd9a7faefb5ab6b5cf416fff", 0x1d, 0x6}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 09:43:10 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000018c0)={'erspan0\x00', 0x0}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001e00)=[{0x0, 0x0, 0x6}, {&(0x7f0000001d00)='?_\beL', 0x5, 0x7fffffff}], 0x22a70b0, &(0x7f0000001e40)={[{@errors_continue='errors=continue'}, {@uid={'uid'}}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x7fff}}, {@fmask={'fmask', 0x3d, 0xb24}}, {@errors_remount='errors=remount-ro'}, {@gid={'gid'}}], [{@smackfsdef={'smackfsdef', 0x3d, ')#\xef\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) [ 271.052953][T30115] ================================================================== [ 271.061080][T30115] BUG: KCSAN: data-race in mm_update_next_owner / page_cache_ra_unbounded [ 271.069551][T30115] [ 271.071862][T30115] write to 0xffff88812acd2024 of 4 bytes by task 20414 on cpu 0: [ 271.079560][T30115] page_cache_ra_unbounded+0x484/0x4c0 [ 271.085026][T30115] force_page_cache_ra+0x226/0x260 [ 271.090134][T30115] page_cache_sync_ra+0x194/0x1c0 [ 271.095139][T30115] generic_file_buffered_read+0x38d/0x2110 [ 271.100940][T30115] generic_file_read_iter+0x80/0x3d0 [ 271.106204][T30115] blkdev_read_iter+0xb3/0xc0 [ 271.110860][T30115] vfs_read+0x552/0x5c0 [ 271.114995][T30115] ksys_read+0xce/0x180 [ 271.119144][T30115] __x64_sys_read+0x3e/0x50 [ 271.123631][T30115] do_syscall_64+0x39/0x80 [ 271.128037][T30115] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 271.133910][T30115] [ 271.136222][T30115] read to 0xffff88812acd2024 of 4 bytes by task 30115 on cpu 1: [ 271.143833][T30115] mm_update_next_owner+0x1e9/0x4c0 [ 271.149014][T30115] exit_mm+0x2ff/0x370 [ 271.153074][T30115] do_exit+0x3c2/0x15a0 [ 271.157210][T30115] do_group_exit+0x16f/0x170 [ 271.161781][T30115] __do_sys_exit_group+0xb/0x10 [ 271.166612][T30115] __se_sys_exit_group+0x5/0x10 [ 271.171443][T30115] __x64_sys_exit_group+0x16/0x20 [ 271.176447][T30115] do_syscall_64+0x39/0x80 [ 271.180844][T30115] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 271.186707][T30115] [ 271.189015][T30115] Reported by Kernel Concurrency Sanitizer on: [ 271.195150][T30115] CPU: 1 PID: 30115 Comm: syz-executor.4 Not tainted 5.10.0-rc3-syzkaller #0 [ 271.203885][T30115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 271.213921][T30115] ================================================================== [ 271.221960][T30115] Kernel panic - not syncing: panic_on_warn set ... [ 271.228529][T30115] CPU: 1 PID: 30115 Comm: syz-executor.4 Not tainted 5.10.0-rc3-syzkaller #0 [ 271.237262][T30115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 271.247302][T30115] Call Trace: [ 271.250582][T30115] dump_stack+0x116/0x15d [ 271.254898][T30115] panic+0x1e7/0x5fa [ 271.258794][T30115] ? vprintk_emit+0x2f2/0x370 [ 271.263470][T30115] kcsan_report+0x67b/0x680 [ 271.267955][T30115] ? kcsan_setup_watchpoint+0x46a/0x4d0 [ 271.273480][T30115] ? mm_update_next_owner+0x1e9/0x4c0 [ 271.278829][T30115] ? exit_mm+0x2ff/0x370 [ 271.283076][T30115] ? do_exit+0x3c2/0x15a0 [ 271.287386][T30115] ? do_group_exit+0x16f/0x170 [ 271.292136][T30115] ? __do_sys_exit_group+0xb/0x10 [ 271.297140][T30115] ? __se_sys_exit_group+0x5/0x10 [ 271.302155][T30115] ? __x64_sys_exit_group+0x16/0x20 [ 271.307336][T30115] ? do_syscall_64+0x39/0x80 [ 271.311906][T30115] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 271.317960][T30115] ? cpumask_next+0x1e/0x30 [ 271.322447][T30115] ? __rcu_read_unlock+0x51/0x220 [ 271.327450][T30115] ? __rcu_read_unlock+0x51/0x220 [ 271.332455][T30115] kcsan_setup_watchpoint+0x46a/0x4d0 [ 271.337811][T30115] mm_update_next_owner+0x1e9/0x4c0 [ 271.342989][T30115] exit_mm+0x2ff/0x370 [ 271.347040][T30115] ? taskstats_exit+0x334/0x730 [ 271.351871][T30115] ? acct_collect+0x34e/0x360 [ 271.356526][T30115] do_exit+0x3c2/0x15a0 [ 271.360679][T30115] do_group_exit+0x16f/0x170 [ 271.365253][T30115] __do_sys_exit_group+0xb/0x10 [ 271.370084][T30115] __se_sys_exit_group+0x5/0x10 [ 271.374919][T30115] __x64_sys_exit_group+0x16/0x20 [ 271.379941][T30115] do_syscall_64+0x39/0x80 [ 271.384341][T30115] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 271.390226][T30115] RIP: 0033:0x45deb9 [ 271.394096][T30115] Code: Unable to access opcode bytes at RIP 0x45de8f. [ 271.400934][T30115] RSP: 002b:00007fff129914a8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 271.409329][T30115] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 000000000045deb9 [ 271.417282][T30115] RDX: 0000000000417811 RSI: fffffffffffffff7 RDI: 0000000000000000 [ 271.425236][T30115] RBP: 0000000000000000 R08: 000000008081daab R09: 00007fff12991500 [ 271.433187][T30115] R10: ffffffff8117a6df R11: 0000000000000246 R12: 0000000000000000 [ 271.441139][T30115] R13: 00007fff12991500 R14: 0000000000000000 R15: 00007fff12991510 [ 271.449105][T30115] ? __fpregs_load_activate+0x6f/0x1f0 [ 272.510337][T30115] Shutting down cpus with NMI [ 272.515556][T30115] Kernel Offset: disabled [ 272.519865][T30115] Rebooting in 86400 seconds..