038] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 308.561854][T11056] VFS: could not find a valid V7 on nbd1. [ 308.621172][ T1988] block nbd0: Attempted send on invalid socket [ 308.627664][ T1988] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 308.644517][T11066] VFS: could not find a valid V7 on nbd0. [ 308.705438][T11063] IPVS: ftp: loaded support on port[0] = 21 [ 308.804902][ T2038] block nbd0: Attempted send on invalid socket [ 308.811386][ T2038] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 308.832791][ T2038] block nbd1: Attempted send on invalid socket [ 308.839096][ T2038] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 308.850699][T11068] VFS: could not find a valid V7 on nbd0. [ 308.859624][T11062] VFS: could not find a valid V7 on nbd1. [ 308.879372][T11056] netlink: 264 bytes leftover after parsing attributes in process `syz-executor.1'. [ 308.893015][ T8459] Bluetooth: hci4: command 0x0419 tx timeout [ 309.050245][T11074] IPVS: ftp: loaded support on port[0] = 21 06:00:41 executing program 1: r0 = syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/10], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@private0, @in6=@ipv4={""/10, ""/2, @local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@broadcast}}, &(0x7f0000000300)=0xe4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r3) fstat(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380), 0x8081, &(0x7f0000000580)={[{@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x401}}, {}, {@mode={'mode', 0x3d, 0xb9e}}, {@mode={'mode', 0x3d, 0x4}}, {@mode={'mode', 0x3d, 0xfc}}], [{@appraise_type}, {@euid_eq={'euid', 0x3d, r3}}, {@uid_gt={'uid>', r4}}]}) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0xfffffffb, 0x1, &(0x7f0000000180)=[{&(0x7f0000000100)="30a14f36ffdaa94592e614baa220b212fc44a60c236f00df63b03a2566fb49db3e96c44220a24f", 0x27, 0x7}], 0x80c00, &(0x7f0000000480)={[{@shortname_win95}, {@shortname_winnt}, {@nonumtail}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@tz_utc}, {@rodir}, {@utf8}, {@shortname_lower}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x1}}, {@utf8}], [{@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'v7\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x30, 0x30, 0x39, 0x36, 0x38, 0x63, 0x61], 0x2d, [0x31, 0x66, 0x62, 0x35], 0x2d, [0x32, 0x30, 0x65, 0x66], 0x2d, [0x51, 0x33, 0x52], 0x2d, [0x39, 0x34, 0x64, 0x62, 0x37, 0xf, 0x32, 0x30]}}}, {@obj_role={'obj_role', 0x3d, 'v7\x00'}}, {@uid_gt}]}) pivot_root(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)='./file0\x00') 06:00:41 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x7bad, 0x2, &(0x7f0000000100)=[{&(0x7f0000000200)="b28c7c3d7a3f852d06791feb5db46ed79ae1a7bcf806844b5fd81e89997df94ff1551208593397b1aba1f2d6e35112342384b1c1450c3a01259b76838741d812ce5b10c83a37be4bc26c693f31a8b83645aa1012f1e3a327a5379179794c7842c50cb1577ae20bccba4f2630f13ce56f503b6d207519339368854a18decf0f99bb45dfa6a4b586eb16b3449dbf58d00723a62d87de0fa9dabb26f94d883b28b580e3492d2ac3788af42dbc68978c4623aa14b0444cc14bd0b1c949a8de37bbeabfa749851f6c8b6382f32cf4ec7f317286849e1857", 0xd5, 0xda5}, {&(0x7f0000000300)="719c53c45556bde610e0da487e139fe2bc4a734ed394edd974357823f9c114dab84931bdca3346079f20542595aafc52d5d8972a922e6715a5f58ae6724e3a80c6d872c0f7c98e49d85077680aa495fe28e5a5d110cc7e2d172cf3789719ae7201802f740f64c7d0ed3ae4472b6fdd34e3e90b91076aa942e01b70e386067a0ed29fc2fdc1ed6c89b99dc2b6b8356e3d8c3e8b1804a7ed8fd58105784271fa87f1dd42b675f3b0b87c05c8512c5e219b172c0f2d4158", 0xb6, 0x40}], 0x800, &(0x7f00000003c0)={[{@user_xattr}, {@data_ordered}, {@user_xattr}, {@balloc_border}, {@usrjquota}, {@hash_tea}, {@nolargeio}, {@nolargeio}, {@replayonly}], [{@dont_measure}, {@seclabel}, {@pcr={'pcr', 0x3d, 0x1d}}]}) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) 06:00:41 executing program 4: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) [ 310.030365][T11123] loop1: detected capacity change from 0 to 264192 [ 310.193004][T11127] loop0: detected capacity change from 0 to 61 [ 310.265251][ T1988] block nbd0: Attempted send on invalid socket [ 310.271728][ T1988] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 310.275711][T11127] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "usrjquota" requires an argument [ 310.275711][T11127] [ 310.291888][T11132] VFS: could not find a valid V7 on nbd0. [ 310.674741][T11138] IPVS: ftp: loaded support on port[0] = 21 [ 311.392885][T11128] loop1: detected capacity change from 0 to 264192 06:00:45 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:00:45 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) kcmp(r3, r1, 0x2, r2, r2) 06:00:45 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@md0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) 06:00:45 executing program 4: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:00:45 executing program 1: pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x5000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) splice(0xffffffffffffffff, &(0x7f0000000380)=0x3, r1, &(0x7f00000003c0)=0x9, 0x4, 0x0) sendmsg$NL80211_CMD_SET_PMKSA(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14, r2, 0x1, 0x0, 0x0, {{0x32}, {@void, @void}}}, 0x14}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_INTERFACE(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x54, r4, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x73}, @val={0x8, 0x3, r6}, @val={0xc}}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x6}, @mon_options=[@NL80211_ATTR_MNTR_FLAGS={0x8, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_ACTIVE={0x4, 0x2}]}], @NL80211_ATTR_IFNAME={0x14, 0x4, 'bond0\x00'}]}, 0x54}}, 0x0) sendmsg$NL80211_CMD_SET_PMK(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0xd0, r2, 0x300, 0x70bd25, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r6}, @val={0xc, 0x99, {0x4, 0x26}}}}, [@NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_PMK={0x14, 0xfe, "1ff2a88f88201a98c19372e961c686c1"}, @NL80211_ATTR_PMKR0_NAME={0x14, 0x102, "4bb5aabcfd3bf70616030b9fac429afd"}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_PMK={0x14, 0xfe, "d019397d9e9149f1cff29ff52d121978"}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_PMKR0_NAME={0x14, 0x102, "fc82764e8eac82ad709410c0b36fc665"}, @NL80211_ATTR_PMKR0_NAME={0x14, 0x102, "83e72cf6126e14f51b271c18550b72ea"}, @NL80211_ATTR_PMKR0_NAME={0x14, 0x102, "4d2cfc05916a4817e0b35611d9269c0d"}]}, 0xd0}, 0x1, 0x0, 0x0, 0x1}, 0x40) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) [ 313.855281][T11178] IPVS: ftp: loaded support on port[0] = 21 [ 313.858632][T11179] IPVS: ftp: loaded support on port[0] = 21 [ 313.971466][ T2038] block nbd1: Attempted send on invalid socket [ 313.978158][ T2038] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 313.998729][T11180] VFS: could not find a valid V7 on nbd1. 06:00:46 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r2, 0x0) preadv(r2, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000080)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8dd0f0f6300bfc7442402c43a727fc7442406000000000f011424f30f090f013a360f0666b8c0008ec066baa100ed", 0x4e}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000100)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000004cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = openat$ipvs(0xffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x2) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x4, @perf_bp={0x0, 0xa}, 0x12, 0x200000000000000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4bb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) [ 314.092750][ T1988] block nbd1: Attempted send on invalid socket [ 314.099149][ T1988] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 314.113618][T11183] VFS: could not find a valid V7 on nbd1. 06:00:46 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() syz_mount_image$erofs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0xa0, 0x2, &(0x7f0000000100)=[{&(0x7f0000000200)="77b19e5fde845afc48ab6bda612b12a5d1cd537099b93d0e60ba6b2054265f48d9d4f3ce659b9c04aa786588b7df03f2c57846ed39e99a8743e63f78164ca578577935a6eec573067a391842f74d7b0300d2097e94f3a928bbbc40ad0962f08fb015c301387d4ee98699c526fe514fe067e1410b413f6dbba9ef0762b9af5966615ec1ffb495150e41eeeeb6aeec81e54af01f261f9377a719c3db9cec7f82a32722d6da85df5b49c35e6efc729d22f9ee4d1764fd9389a664e72e8b38c051729f47645e97f45be001c280edfdf07d6169d5b054f3624e69b0883bef12321f291dfb276c54230034bbb870b219c522419139717b7f68d098cf0d14683a98f7dc55f3537d704445b4a6a555ff807ddd456fadbca99978755c0d3456e6260486588357ef675829f3ecca7ab2bd4e09370f5ac0ede52244519d7a20740151f3c852b1d542ae3133611216e58493c785d3b82613f8f8356abdbedaed60e56ff16a275f1ebaedecf93d8147a0b62b61266f300a5dd0d7f2b915729d7deb69e8d2a35301203ed42bbabe8cae527f8f82d4481bf9d34822c63b571bf888b5edc0b038369007ed5a1e26aa7bb3b9701e37eabf582300ae3355b7a07ad0266f3e16ab1ac18b383ee7569c89b7b87e60654125347a742c5c03c466be586277110f997f9eeef5799664c3b9c7d277a77b87f1b8b60755130e9680493f2850d30e7b240323fdf69bb1e2a0cd95cc9e60775c801b4b4dee2e19f08be8c4202cc2de25a3c20d8849946025bfef78e05c676bfa987a566c5fec754d35c2539fc7bdd538a8af0bb3064d882dda4a6c78f62df473a6bdb1478043d4ef39f63615db318e2e957ebc4b69c472d67d9066066a45c8c11081963cf4b28f53a629089d3bb2c10a52c06f4905fe2c36738ebdc0ea0206a249ecc568cc470e77bec5410272edca95db284d9f942f7a37e73a41d15410cbac3b3cb438099986824ec74f6537f3667981277a6f6de602e6b0a4a12713954d6e8f668b82a2cd438026c35832a6bfe019159a8b96d8362b1199da750046502ebffb1b65e9df15a0b5f83b60e19552446807745cde292bee9375dc920286bed0801846fd114b0effaf752a74fab4ccecb01dd18deb94528db0e4e6c9c5e3adafdb162123765efae853870e58286998567d2cb7a374688658c97136f60f58376feefdcbf19ced77c80896aae33c860a962f0b9d9a063ad4c045347eabddbb31310eac73c42bf8256e0b4ff2ed743ac02ceec697da1a93e31ae87d9a15d218ee6f10138acfc909f2e34f7ac52c37e05f045796113f773e0ef63faa20d858e7f781921bafe073b28d28b0a1a4f91bbfb5f63a9ea5631357c386727b8c489606ed1fc8a0f05884cd3ebef4a0c6163fa5fefe354033ba8ca3e1a26e3be5500684264f63ee5db6856a2158f24cf0f56d88fb3eee6f3352f5f0cc70bedba2b6139b06717c53c7cd7fded75f434b16566328f6fde72b330788498af5564cffe12d7814322dd5524c0217f1555117a33e2b3df4bc495bb41019f0f45fab0d4fe0cfcfe4204836e2bff988761dd912b05e47e366b294f120c8e8389f5968d52c77819cfe67174a57ea883553c44c2ef89fd79f9957d4d1b9fb0dbf594b2efbc7d349dba6bac4691d04390608304faad039dd8fee2618bf1e3dd517921fbd99e73e2265d4d2aa144758bfba13fe2f36e136b48975251610d7fa49382564a54108aa6361877607bb35e158c6e7172d9c832a8449c8f87188103a5d82fa7431825d870141aba14721069c86d4b15860347de7c3f44fbb2b8b3cfc4ab5e558402d8ec14a7e53a8792b236c5b8f774ebe862b07ee07027ff2a3cd363b66e1be10e8ec3e6af876648d4eb7b6aa568c0a1c1aa43288ed592e47c860e825384303ee2b8ca3857c6bb3b864c09def2e90aa57e66e317622144c27bc92c0e824760993b5a5b2e505b4e6cbdaef3114f7374fcf9349272c4d89ae84e8d7427fdac204a932f7be82854f746df6f4305a08a7add33d54f03ce23223e77c0c916cc05ed1a286a1e09114fedc23e3b1bb2b4ddf9ab6687c23c42cfc03de48af4e92937b5832aee1bef1e5ba84d189d403f36fa630b3982e7de5238d763c9e964f743be0cf94c7b2564372b9d80bfb57d9434f6649eff6af95676046023759607edb95cbf002800dd5cfba75e1d7da6bafaed8de95f9e526a981ff758d471e8e37c41e16eaca4acfc10edb26ca20e3fc51047924d55ed6ff2be368f7aba5c00844598bf8fb46026babb7ae3cbd1da47ee65346913550de20fa2c80ba5a23ecb6b68ebc9f4f86f99d81cc7c9490a0ee8a119fc084ba54a90b08dbdb039b12ffe2787b9eec8e9bcf74779f4180b683d634d959702f131b4c7122fc774199d021060e214e6753ba221d24bf21027b59c93b0519e2dd38e452e5e8c3f8c792ce44ac99f3cba7486fe3e0fdc0c294134e35323784e657c7872b4eb95d8a3d8f558b85e2c24cbad52c7b6b78588bdd52df59a3cf567d6c307a64018fe53199d1982a392df0d56f24e2d734d1fb3c33f1177fb12038ee94fa27e3b6c15e45e08bf2aed5b5e8d43c83d60190890b09767c497d00e6fdab3543864e74530ad6d39852301e5ad4feee5558bc5d006d8e093fcdac5c8f180be4582fc3ea2e9f066a674959a0c99b389ed163dea06a797f29348547591245050b5dd5b1018b89cefc87346d25c577817e94a241e87500524090e9c9b68cce08a909a94001fd64f970c77ee4bf59119c741e3fa8eff69f682bfafe91bff63db1f9be3a28539446d36d2937eb8a232a8fec70ed8905cbee78df936dbd76c0902b1b77dbb90a0d4b497018fc2577b11146ea00fa7eead03eadffaa854abcdfea6af98d12806ba85a8bafc4ceeceb0f90b54f0eb71b4593a4e40dbdb449e6657bd070268d5ffbf8fef7401139c6ce44b3b447c6a808a2a8a718c9b215c7b1c8248f04f01c047e76ad987fb21be0cd7522de7ac90b38a5b8c6c3afdf93aa0a62aa3b48de4b0751c561b39140982e2a3724e3fce6d93c98b9e914e84142b5094fa17acd97b78988216aee0d7152147e1d305cefd6a8a4721067b0981c6b30bf293e9c56dc6ba16dcbdef8fde551f10e0f18c603ef0b14ebb8aba0b78d6bfdca12a0a3d2c4fd60a21c775ac24ee6b5474db2dc017fb8d7aa2011db630d17c1fd2ae3ae49411af992e1a7f113f2924f36f15f7dbab6465030aa4ecbfff4ef31ffd122415a064d6ca1e7488046d0cc8c58dd2e52bdb4b030a42bc95c06088e09f104f26eed33619c03098b6b77dc0161e3d9302218df096e5cbbbb920a8e466bfd522a0b7bcef2f7c10033e4a71e3d9aa97415df64316c877cd7028beb5f0cbeb023f28f0ff42e0cc88ae96095470acdd7fb3819602ab57fd94c0194a4a9c04a4e6326b8de23ca90fef6fec9a0dbf0176af123ddfda4994713932ae06b57ee53fa7cc865a076251df87de73b48eb4d898b93282cf1af98c9a2da5ae737cb91ae81261bfc1f33b2f6438abf150801e70cc6664a3e7435a29dca1c9ca18e48953fc78d53be3ad630ba6333ee0e62987b3d8675ab6243ec83036e9333e782fdbb48dc04fa088763f7474d95a4be937ed8ae8a106e965f99ae3d62414f737b45618b82958f2711f7dc04c4ebff37863ef4192d1c93dfdfdabd6667f1816bfee59a772174054c99f499137ba8052cab06b4be1d0f98150c754dddc800ad338f2d69fa7a94de0f6d76b1d830d663b14fb94bf8ce40d8419ec610739f6c6ff71d4a91f03253cba840ed89b078d84442a5de708e8e01176d7f872b6d38a50fc77bb5a2a1e08f8128ce19a818bdc02caa938738bbc91d5b432eabafcad5bf41961bdc9557eb35cf700a3cb7ea8e038eec28cff9bbe6a50a17e3f8704baf2c9fa8574ab6f05c67e018d62cbf2abf350aa912e15c145df7e94394e37ba3cbcbe3872bcdc83a66c511023eae8ef0ce4d8b31ccd4efca58f5cafef89378e200f8355b4cff7ba2c02bb4405b5cf95059da9b12c161faa8d8357291a6c9ce8724d6c763459d00f24411cbdd21fad34f480fe3955d9135d06981f2bf02e044cabec97405209a37b38f4051f31b59e1eec51080f4035bb9c1d8a8e69bc31da65604f9336abadec33dfcc1afc575ff62137d2bd8e7d31eab74c96375e4884a5be66c336b4fd0eb496ee0b90d933c727eed6d6b89b6e6b9504c16f66fe55a3aa125f0bf4b170aa045e8debcac6a375cb87755be1fd6dd25a96d52234f2f9bc0bc903790973395e91a471f0d5ee93aae886e42aef53f83476221e28045debc7073d3beea15760101355791255c8ab9b9007421b2062c73785753ce8ff202b1d77830cb2935c2fc5e8270f073f2ea31ab89bb6cbf0e3e5c330c42090b692876fdfac46df57c2a5b57a1c1362cf4ac67d68432ba13e429fbc0db8767f0730ec9a4fd42e27bf6659219da12d564897923f928915f62880783f848c2c4fed7b18cc996442f1583fb3964e63c5768cff793a0216b420330b9a8aff8f1598fa08ea03266ca05fe96d7cc6e96cce9cfaf0fd8215ed68f715f165684aa677d79ce1909894f46ed1a9e19e34fb3cae0f405dc5c0c12d1fc53719bd156981428b7fd4a3048d058e4c4b63d216e15dbc01ecb8f1c257034687bd33c110577a949367bde70661bc013517670f425e843b163a913f865883193ea95a8fd39bdfe74ec688b356983d6346248220809d043889d00fc3f68c2063459155e92f5196915fb8bd6e2a2f639e70c686589132468a9ea2340543528baf9779f8f0bb76cfeb8206f8890e37a50fd9e9a10f7c4fa414c78f2b1bc5895cb906eacc33981e333079f62820d9bdc288a95bdd506ff9b09ee783e320d861af01fcb27455d330dbf72caf975c16227464209677557a9a13c02246dc1887382aed9e894f368013e004ddb8eb2ef1cec1ca003767fb18e383aa7ce6ce973eb7815566e0fa1749d118b72c790c9f9026316cb30be2c7a959394d5d77c734a935c4e83bcac8a5ccce3df3f360253d9780cdc67d4caa3285b73576256cab750ee53892c9d085c294571ff3a2048044d998b79f1df019f4843219cba2157a0e8ede0d99554392647b1772366d7cd9bbcfbf9f997cb8dab47ad3d397674e4c5856b1038e7dc4bebacec3406e9eec8e0b0c808e6a50feea190400ffe2415aa294290589b0203cb0e894f18c9d13e7aa489348860f5c531a921bcf1d4a7fa89942d965649e898d41a091241a51457a1b530084b87e59cf5839dfff544eb6677614c4694e259273363363230082c7533376685b66529d04e260d43141364d755b2ac17ad4c7e290afa78fa50fc387f7ff9b30a2fa82ada6a48065bd969f342be236a1b6ea51afbe966db7286ed2475661ca5b05d614d1a9379f8f299cdafee45da75374f9b4dc6eb2028d3c2f1d13070d341a03541a3cab6ebacdd0f52f33ffca410606b87cc627bd3f5e0574a53b86c87e8b946c59d4b915a955d8d38413267eac12d2f62746a089fb1be568670f152552ca12c24895d4d4010952fe5699301c14639f99cd03ab7ebda4d3e83ea8ca1e092c6678cfd4b26d3175992a166d13bba0d4b3bbdba0a23c49e3b2607cf32d06c3623cf3e5550fe5d2d2d7beb8f3898f5ea59c345ff842b003a09feae645aee0744c7969181f4372b2831747d811f27f08ffb5146d3d69388a8f0761cb3c659624d884038e23cff11f913033f7477b18d80cdfa4f73511fc87c131a4b33ecb780869161b0af827141107caf88129137ee90285e374ae10efc7b37f3e6a93da1", 0x1000, 0x5}, {&(0x7f0000001200)="469cae610d6ac03d1ae4beb9b58cb0b36b2b89be6881198409f6a7737636b78a8ef66889742c22d02bb61a4407c9814ad5ed26783dcd6e44864162cd0a96363f0e31fa2516b8dd3aa9a2447f2a58c292ba778582946905b2974f5ad1b2eb7cd2da002efceaf9a5422d89ce739ffce137716d858e7df879346cf8b50745d38947b66a71dc749c7cb4f856d7465cb61aa03cab49623365da581948bef33f6854ed25bc41490722c30f8431989d6299954c02c07a40fa45bcfcc4b125185b460b047fb54499", 0xc4}], 0x2000010, &(0x7f0000001840)=ANY=[@ANYBLOB="61636c2c61636c2c666f757365725f78617474722c61636c2c6e6f61636c2c7569643c80c13e0d5a3f69edaa6c2ff24cd338f510c29123953ee443e31d3ee1f456bba7c7222be423055c13f8a15a7ed1920d04fbd500fc9bfef1ed6c211210a37ab6fb53d3ecb3c1b61c1316", @ANYRESDEC=r0, @ANYBLOB="2c735a0d636b6673666c28534adb8f1d21577764b75a07b2595b683177f4ab583186eea0fd90cd8132f2ca29c65eb2c83ec364c8ce5cb92fc1c6cfee344e2311a31649f362e1dfe88c4b3e0d09f72f0d25984a2f51b1652043275bf918a11462c1f17811d350c8bd33f375afbd87730c04c7fef29d8fdb4572a1fdea9e4e8a32000c9cf23d971a75212a"]) mount(&(0x7f0000001380)=ANY=[@ANYBLOB="000040008662275cc3d768ee7699a289ecd16686a654e415c3cee0c046ecbcb168585d21603704bd17e7e84e0dea4379c1cd22797e665495d488a90257a8afc6597e4df8a5cfe086473db111c9154200000000"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000180)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = socket$inet6(0xa, 0x3, 0x2) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) setsockopt$inet6_int(r4, 0x29, 0x21, &(0x7f0000000180)=0x101, 0x4) r5 = dup(r4) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x4e25, 0x0, @empty}, 0x1c) getpeername$inet6(r5, 0x0, &(0x7f0000000140)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001480)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000001580)=0x120) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(r8, 0xee00, 0x0) syz_mount_image$fuse(&(0x7f0000001400), &(0x7f0000001440)='./file0\x00', 0x0, 0x0, 0x0, 0x82, &(0x7f0000001740)=ANY=[@ANYBLOB="66643d1c77d7761db0ee23835076b1fbb2cd953c025a3143b2d176bc2d0f6128209fa61488420a001f3bb783497146bd262b0de9ffed", @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r6, @ANYBLOB=',group_id=', @ANYRESDEC=r8, @ANYBLOB=',allow_other,default_permissions,appraise,euid=', @ANYRESDEC=r0, @ANYBLOB=',\x00']) setfsuid(r3) setresuid(r0, r1, r3) [ 314.774287][T11205] IPVS: ftp: loaded support on port[0] = 21 [ 314.873994][T11209] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 315.032030][ T1988] block nbd0: Attempted send on invalid socket [ 315.038527][ T1988] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 315.063300][T11234] VFS: could not find a valid V7 on nbd0. 06:00:47 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) pidfd_open(r1, 0x0) kcmp(r3, r1, 0x2, r2, r2) [ 315.250217][T11238] loop1: detected capacity change from 0 to 8 [ 315.310390][T11238] erofs: Unknown parameter 'fouser_xattr' [ 315.345614][T11237] fuse: Bad value for 'fd' [ 315.384788][ T2038] block nbd0: Attempted send on invalid socket [ 315.391178][ T2038] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 315.447467][T11234] VFS: could not find a valid V7 on nbd0. 06:00:47 executing program 4: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) [ 315.585293][T11238] loop1: detected capacity change from 0 to 8 [ 315.594453][T11238] erofs: Unknown parameter 'fouser_xattr' 06:00:47 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) [ 315.688622][T11237] fuse: Bad value for 'fd' 06:00:47 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) lsetxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@v1={0x1000000, [{0xffffffff, 0x5}]}, 0xc, 0x1) mount$overlay(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200), 0x10023, &(0x7f0000000240)={[{@metacopy_off}], [{@obj_user={'obj_user', 0x3d, '\''}}, {@seclabel}, {@hash}, {@subj_user={'subj_user', 0x3d, '%&'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, ','}}]}) truncate(&(0x7f00000002c0)='./file0\x00', 0x10001) [ 316.045733][T11273] IPVS: ftp: loaded support on port[0] = 21 06:00:48 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) [ 316.266469][ T2038] block nbd0: Attempted send on invalid socket [ 316.273094][ T2038] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 316.291269][T11278] VFS: could not find a valid V7 on nbd0. [ 316.365023][T11284] IPVS: ftp: loaded support on port[0] = 21 [ 316.508162][ T2038] block nbd1: Attempted send on invalid socket [ 316.514600][ T2038] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 316.553198][T11288] VFS: could not find a valid V7 on nbd1. [ 316.694976][ T1988] block nbd1: Attempted send on invalid socket [ 316.701284][ T1988] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 316.781604][T11288] VFS: could not find a valid V7 on nbd1. 06:00:48 executing program 0: getrlimit(0x8, &(0x7f0000000040)) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2f646576ed0062643000"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) 06:00:49 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) pidfd_open(r1, 0x0) kcmp(r3, r1, 0x2, r2, r2) [ 317.190187][T11329] IPVS: ftp: loaded support on port[0] = 21 06:00:49 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="a047cd8b08c7e633b41079e011138a0437d5b7cd9ed95bdf269b8ac9328b30e1d38873da546de221c96ba9811aa41a3bc3e73a8ab8e8aa86435fb5f7b2386ac52f2ba740531d05ab"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) [ 317.711552][T11344] IPVS: ftp: loaded support on port[0] = 21 06:00:50 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'bond0\x00'}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000100)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r4) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x8000, &(0x7f0000000200)={[{@huge_never}, {@huge_within_size}, {@huge_never}, {@huge_always}, {@mode={'mode', 0x3d, 0x1}}], [{@euid_gt={'euid>', r1}}, {@uid_lt={'uid<', r4}}, {@smackfshat}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 06:00:50 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) pidfd_open(r1, 0x0) kcmp(r3, r1, 0x2, r2, r2) 06:00:50 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r1) syz_mount_image$nilfs2(&(0x7f0000000040), &(0x7f00000000c0)='./file0/../file0\x00', 0x80000000, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="29aca6ddfc58450e6d2377f59e885f7aae8f68f5b127101b6daf9a808eda8adb5fdc7736866e48e22b9ef949b2e76f66490c46efd749593b5c413b7451a9b4477ef5c771b8e892bc4c4f352ebe2fe2519371383e9f3b7773dc5b94832faa758e03fc812db2de177b4bd86d363369723cd768781633a157267604e0cca3cb36f9b7979eb5a5723d8bf80fbf4ad9929ff37305d74a41f6d38e35", 0x99, 0x3}], 0x0, &(0x7f00000002c0)={[{@discard}, {@norecovery}, {@snapshot={'snapshot', 0x3d, 0x3}}, {@snapshot}, {@nodiscard}], [{@euid_lt={'euid<', r1}}, {@permit_directio}, {@pcr={'pcr', 0x3d, 0x39}}]}) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) 06:00:50 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) [ 318.805044][ T2038] block nbd1: Attempted send on invalid socket [ 318.811346][ T2038] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 318.832398][T11401] VFS: could not find a valid V7 on nbd1. [ 318.836450][T11402] IPVS: ftp: loaded support on port[0] = 21 [ 318.939876][T11401] tmpfs: Unknown parameter 'euid>00000000000000000000' [ 319.026689][ T2038] block nbd1: Attempted send on invalid socket [ 319.033250][ T2038] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 319.054525][T11401] VFS: could not find a valid V7 on nbd1. [ 319.062319][T11403] tmpfs: Unknown parameter 'euid>00000000000000003327' [ 319.287869][T11412] loop0: detected capacity change from 0 to 264192 [ 319.395638][T11412] NILFS (loop0): couldn't find nilfs on the device [ 319.568794][T11409] IPVS: ftp: loaded support on port[0] = 21 [ 319.578979][ T2038] block nbd0: Attempted send on invalid socket [ 319.585571][ T2038] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 319.602025][T11421] VFS: could not find a valid V7 on nbd0. 06:00:51 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f0000000040)='./file0\x00', 0x40, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) [ 320.243085][ T2038] block nbd1: Attempted send on invalid socket [ 320.249508][ T2038] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 320.278544][T11461] VFS: could not find a valid V7 on nbd1. [ 320.357861][ T1988] block nbd1: Attempted send on invalid socket [ 320.364460][ T1988] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 320.377203][T11461] VFS: could not find a valid V7 on nbd1. 06:00:53 executing program 4: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) pidfd_open(r1, 0x0) kcmp(r3, r1, 0x2, r2, r2) 06:00:53 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) kcmp(r3, r1, 0x2, r2, r2) 06:00:53 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$nvme_fabrics(0xffffff9c, &(0x7f0000000040), 0x4404, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) r1 = openat$vcs(0xffffff9c, &(0x7f00000000c0), 0x10840, 0x0) fanotify_mark(r1, 0x31, 0x2, r0, &(0x7f0000000100)='./file0/file0\x00') 06:00:53 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r4 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3001000010000104000000000400000000000000", @ANYRES32=0x0, @ANYBLOB="202002000a2a04000001128009000100766c616e00000000f00002800600010004000000040004807c0004800c000100040000001f0000000c00010007000000010001000c000100fc030000e43900000c00010008000000090000000c000100ff070000730c00000c000100e7d10000050000000c000100a3ca0000010000000c00010002000080fcfffbff0c00010008000000aea100000c00010009000000bf890000640003800c00010009c0c6c1e02b00000c00010000000000080000000c00010009000000000000800c00010002000000080000000c00010005000000003000000c00010005000000d82e00000c000100010000000a0000000c0001004cad00000400000008000500", @ANYRES32=r3, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r3, @ANYBLOB="e68d9028d200100000e88cf2fa6a39e3b5c04defd2df4b1399f1a49616b251048a4662ea56b2dcb231564c0a5424a6f5db3a"], 0x130}}, 0x0) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB='p\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="100029bd7000fbdbdf25010000000800040000000000050006003f00000014000100fe8000000000000000000000000000bb050006007f000000080002000700000014000100ff0200580e6c7eaf6e69bf0b7a07f7000000000000000000000000011400010000000000"], 0x70}, 0x1, 0x0, 0x0, 0x40c0}, 0x40) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$SO_J1939_SEND_PRIO(r2, 0x6b, 0x3, &(0x7f0000000280), &(0x7f0000000340)=0x4) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2f0600762f0900643000"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='virtiofs\x00', 0x8000, 0x0) 06:00:53 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) [ 321.813883][ T2038] block nbd0: Attempted send on invalid socket [ 321.820195][ T2038] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 321.847344][T11469] VFS: could not find a valid V7 on nbd0. [ 321.878116][T11470] IPVS: ftp: loaded support on port[0] = 21 [ 321.966433][T11471] virtio-fs: tag not found [ 322.005428][T11472] IPVS: ftp: loaded support on port[0] = 21 [ 322.035496][ T1988] block nbd0: Attempted send on invalid socket [ 322.041803][ T1988] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 322.066286][T11473] VFS: could not find a valid V7 on nbd0. [ 322.336121][T11482] IPVS: ftp: loaded support on port[0] = 21 06:00:54 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg$can_j1939(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000000c0)=@ieee802154={0x24, @short}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000200)=""/79, 0x4f}, {&(0x7f0000000040)=""/16, 0x10}, {&(0x7f0000000280)=""/149, 0x95}, {&(0x7f0000000340)=""/80, 0x50}, {&(0x7f0000000180)=""/16, 0x10}], 0x5, &(0x7f0000000400)=""/241, 0xf1}, 0x40002100) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x1008040, 0x0) 06:00:54 executing program 1: r0 = syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)=""/140) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc01cf509, &(0x7f00000000c0)={r0, 0x7, 0xfffffffffffffffe, 0x8000}) linkat(r1, &(0x7f0000000100)='./file0\x00', r0, &(0x7f0000000180)='./file0\x00', 0x1000) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f640500000000000000300b8f078d377571f708f20004bdd2b35d62faf107829d498256fa25d5fb3e3a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) [ 323.047431][ T1988] block nbd0: Attempted send on invalid socket [ 323.054238][ T1988] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 323.099540][T11525] VFS: could not find a valid V7 on nbd0. [ 323.187715][ T1988] block nbd0: Attempted send on invalid socket [ 323.194210][ T1988] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 323.209103][T11533] VFS: could not find a valid V7 on nbd0. 06:00:55 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f0000000540)=ANY=[@ANYRES32=0x0], 0x24}, 0x1, 0x0, 0x0, 0x4040814}, 0x24000040) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_int(r2, 0x29, 0x21, &(0x7f0000000180)=0x101, 0x4) r3 = dup(r2) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e25, 0x0, @empty}, 0x1c) getpeername$inet6(r3, 0x0, &(0x7f0000000140)) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000280)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x70}) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3001000010000104000000000400000000000000", @ANYRES32=0x0, @ANYBLOB="202002000a2a04000001128009000100766c616e00000000f00002800600010004000000040004807c0004800c000100040000001f0000000c00010007000000010001000c000100fc030000e43900000c00010008000000090000000c000100ff070000730c00000c000100e7d10000050000000c000100a3ca0000010000000c00010002000080fcfffbff0c00010008000000aea100000c00010009000000bf890000640003800c00010009000000e52b00000c00010000000000080000000c00010009000000000000800c00010002000000080000000c00010005000000003000000c00010005000000d82e00000c000100010000000a0000000c0001004cad00000400000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="e68d9028d200100000e88cf2fa6a39e3b5c04defd2df4b1399f1a49616b251048a4662ea56b2dcb231564c0a5424a6f5db3a"], 0x130}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="340d0000260f04002abd7000fcdbdf2500000000", @ANYRES32=r5, @ANYBLOB="ffff030003000a001000050004000a0004000a0004000a0004000a00"], 0x34}, 0x1, 0x0, 0x0, 0x40000000}, 0x10) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) rename(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') 06:00:55 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='v7\x00', 0x104c021, 0x0) 06:00:55 executing program 4: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) pidfd_open(r1, 0x0) kcmp(r3, r1, 0x2, r2, r2) [ 323.874169][ T2038] block nbd0: Attempted send on invalid socket [ 323.880676][ T2038] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 323.936474][T11577] VFS: could not find a valid V7 on nbd0. [ 324.174438][T11581] IPVS: ftp: loaded support on port[0] = 21 06:00:56 executing program 1: r0 = syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) faccessat2(r0, &(0x7f0000000040)='./file0\x00', 0x180, 0x1200) [ 324.733659][ T1988] block nbd0: Attempted send on invalid socket [ 324.741642][ T1988] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 324.771350][T11578] VFS: could not find a valid V7 on nbd0. 06:00:57 executing program 4: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) pidfd_open(r1, 0x0) kcmp(r3, r1, 0x2, r2, r2) [ 325.116413][ T1988] block nbd1: Attempted send on invalid socket [ 325.122974][ T1988] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 06:00:57 executing program 0: ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r1) syz_mount_image$vfat(&(0x7f00000027c0), &(0x7f0000002800)='./file0\x00', 0xa3, 0x6, &(0x7f0000002b00)=[{&(0x7f0000002840)="fb53d7e0a21b1c8ee538ba2e94afc972bdfe2f1d4c958519627a8d1f6b1c142169c7", 0x22, 0x4}, {&(0x7f0000002880)="ccb95a6bd697b03ab95c2462e7327836d4b686b2c402a9a1a5c1ab2291bb131a07822f09b1690f4014c6a0d2aa1ffa82749116c6680279459c56f36be0584bf9df0d2362a15d27bab2d68184c6860aaa58649cbd3ad50eb0e06ab8e37fc30e927f33617c18ef3666c976c6fa8db4f61e3d2bb77e2ff8a5744844d3b2d91634965705a8f1eb7883fde41895f3d0a8c0b44c3865e1", 0x94, 0x3ff}, {&(0x7f0000002940)="a6d25c6a6ef0cda6b94e8be10b8b10affe7de0a81d33f1a2576022eb3d60bc4318f7294c6777618cf4101b78592dea1676fe82bc68f354474afe19baaacf91dd084ed0f01515dafa9b3fe6ba2a7fdfd3ad071352c4304802f5ecf1d9922af6f5b6e1249bcada4574", 0x68, 0x1}, {&(0x7f00000029c0)="419838547cf7295fe1b04f3f5ddb6e38b92f483cbf5eff0343e87a1335978b3c17a30ba62517c6738869ae505ca59cc2688e34525891", 0x36, 0xfffffffb}, {&(0x7f0000002a00)="1fc8786155ccf38ebd8b3c1d5da9c26f7358741e0422a7941e46889404be855ad94f8f66b91a8bf540d09305872118a307c2e049362b7afe4ea2f5e930ca42369184953c9870bc727c6dd107ded7eef8f6ced0c9de216b40eb8e89bae1fc60d9d27aafc3afb0b53b91b8a3f2199dc3ac3fbe0abfbbd65cc5ba9aa56cbc3699689a037f087fe712", 0x87, 0x3ff}, {&(0x7f0000002ac0)="2e08d2d793b2dacf1e71648da8e12763d26cc6b596ce5a4db8f61c7e6b464dd91d54e9da97fcaf08b4217170a9fbfa9f2edb", 0x32, 0x4}], 0x6040, &(0x7f0000002b80)={[{@utf8no}, {@numtail}, {@shortname_win95}, {@fat=@errors_continue}, {@shortname_lower}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}, {@shortname_win95}, {@shortname_win95}, {@fat=@sys_immutable}, {@iocharset={'iocharset', 0x3d, 'cp863'}}], [{@smackfsfloor={'smackfsfloor', 0x3d, '\xab^'}}, {@smackfshat={'smackfshat', 0x3d, 'v7\x00'}}, {@uid_gt={'uid>', r1}}, {@smackfsroot={'smackfsroot', 0x3d, 'v7\x00'}}, {@fsname={'fsname', 0x3d, ',)+[$'}}]}) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x2000040, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000001740)=[{&(0x7f0000000200)=""/132, 0x84}, {&(0x7f00000002c0)=""/102, 0x66}, {&(0x7f0000000340)=""/212, 0xd4}, {&(0x7f0000000440)=""/233, 0xe9}, {&(0x7f0000000540)=""/182, 0xb6}, {&(0x7f0000000040)=""/40, 0x28}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000001600)=""/155, 0x9b}, {&(0x7f00000016c0)=""/80, 0x50}], 0x9, &(0x7f00000017c0)=""/4096, 0x1000}, 0x160) [ 325.169650][T11620] VFS: could not find a valid V7 on nbd1. [ 325.206923][ T2038] block nbd1: Attempted send on invalid socket [ 325.213593][ T2038] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 325.229411][T11620] VFS: could not find a valid V7 on nbd1. [ 325.537971][ T3124] ieee802154 phy0 wpan0: encryption failed: -22 [ 325.538129][ T3124] ieee802154 phy1 wpan1: encryption failed: -22 [ 325.737399][T11627] IPVS: ftp: loaded support on port[0] = 21 06:00:59 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) kcmp(r3, r1, 0x2, r2, r2) 06:00:59 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) 06:00:59 executing program 0: r0 = syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x4001, &(0x7f0000000300)={[{@huge_advise}, {@huge_always}, {@nr_inodes={'nr_inodes', 0x3d, [0x2d, 0x6d, 0x33, 0x2d, 0x38]}}, {@mode={'mode', 0x3d, 0xfffffffffffffbff}}, {@nr_inodes={'nr_inodes', 0x3d, [0xa]}}, {@mode={'mode', 0x3d, 0x7fffffff}}], [{@fsuuid={'fsuuid', 0x3d, {[0x31, 0x66, 0x30, 0x30, 0x39, 0x65, 0x65, 0x32], 0x2d, [0x31, 0x64, 0x39, 0x38], 0x2d, [0x64, 0x66, 0x30, 0x66], 0x2d, [0x62, 0x66, 0x30, 0x62], 0x2d, [0x37, 0x34, 0x66, 0x64, 0x30, 0x30, 0x61, 0x33]}}}, {@uid_gt={'uid>', r1}}, {@dont_hash}, {@func={'func', 0x3d, 'CREDS_CHECK'}}, {@measure}, {@subj_role}]}) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) 06:00:59 executing program 4: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) pidfd_open(r1, 0x0) kcmp(r3, r1, 0x2, r2, r2) 06:00:59 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, 0x0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(0x0, r1, 0x2, r2, r2) [ 327.491673][T11656] tmpfs: Bad value for 'nr_inodes' [ 327.580490][T11657] IPVS: ftp: loaded support on port[0] = 21 [ 327.625296][ T1988] block nbd0: Attempted send on invalid socket [ 327.631607][ T1988] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 327.635015][ T2068] Bluetooth: hci0: command 0x0406 tx timeout [ 327.643588][T11659] VFS: could not find a valid V7 on nbd0. [ 327.677350][T11659] tmpfs: Bad value for 'nr_inodes' [ 327.698607][ T1988] block nbd1: Attempted send on invalid socket [ 327.705169][ T1988] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 327.722568][T11658] VFS: could not find a valid V7 on nbd1. 06:00:59 executing program 0: r0 = syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f8738642b52fddbdc937dc53e162e6a99d94ac3e5aa88095a06a9cd01aeadb853ef29"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$nfs(&(0x7f0000000880), &(0x7f00000008c0)='./file0/file0\x00', 0x9, 0x7, &(0x7f0000000c40)=[{&(0x7f0000000900)="36a60a4628bbb0eaf792a73cd0f7de8dfc19f27f8bc912f3dd975e41d725c611a47b90e5a9ab45533918a4a62ff6165b8541a118228ec951a3c54c80b84fa48685d0f3969f7a63b780ed148122d4fdbf7ae33e81a9dd9784d1f25d371fd3dc75b92d3dae309d330805b6e2496f1e92f63ec6797b6b8268ed56766efadeb0fd6224eed91c77e46655d972c46ce8c3d990345d0f06502b9604eb09a89cd2cc5dac84f847d50a8ca354c7503e3f9090ee7a98dc72357f5c166c206b64e4f54f9f323fc62487271dc4bb98620c531f6512ea7437d26a6b1945707062c8504ededd766df35947e3", 0xe5, 0x40}, {&(0x7f0000000a00), 0x0, 0x1f}, {&(0x7f0000000a40)="5bd16a09fb6f59911c171714777342c15e47d3314de4d98baece077f73376e7af0dad8311e9d", 0x26, 0x8}, {&(0x7f0000000a80)="d2c1675e594d0295a6e0935797c0b27bd73ebe8f9825f3fb9c6cdce81cc6ed5de3f5a3505c89972fd28a5e8f8acc3fe7b86d769e257f892ff52f77f7fdc7", 0x3e, 0x5}, {&(0x7f0000000ac0)="8d0ac64ef36efd9376fbda44fdac3665b87fcd7f2a911575a76fde9a5610af376a4cbee8485a3a5b7134e58f16acfc9783c9224c19f9e1018c6a3a6bd914a6150e92ebea9bd1d7f2c3c900b158f55ac2f45b4b477aa7732da26536d3a3ac513f197d2017fd6d106f873f970d04dcc650c94470b3b69100422a3d91e5f7bc7b57849ee8f3daf155a45b5eeb569c4e898b089ad6f3b8e880a23609faf0794d5419ec8fceae81c3f177a2c871bb9d9e1b609d644597da02e20d7d08", 0xba, 0x6}, {&(0x7f0000000b80)="f64a3b8ec85eeeeff41eb824b5f659c2", 0x10, 0x1}, {&(0x7f0000000bc0)="eb25f0fbcd767441a5da258da268831672cf6a647304090413c915946b709436951268a269586e30cdbb5927d3bc7311f046873109a1d42f19cee1eb15041279245ba4858a50e64e0a5faec39586175616c0926c64a7", 0x56, 0x80000000}], 0x1214006, &(0x7f0000000cc0)={[{}, {'v7\x00'}, {'v7\x00'}], [{@euid_eq={'euid', 0x3d, 0xee00}}]}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r2) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0186405, &(0x7f0000000180)={0x1, 0x0, {0xffffffffffffffff}, {0x0}}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r5) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000280)={{{@in=@empty, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@empty}}, &(0x7f0000001e40)=0xe4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@ipv4={""/10, ""/2, @broadcast}, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@initdev}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000002140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) statx(r0, &(0x7f00000005c0)='./file0\x00', 0x6000, 0x1, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2, r2}, {0x2, 0x4, r3}, {0x2, 0x3, r5}, {0x2, 0x2, r6}, {0x2, 0x3, 0xee01}, {0x2, 0x2, r7}], {0x4, 0x6}, [{0x8, 0x1, r8}, {0x8, 0x3, r9}, {0x8, 0x6, 0xee00}, {0x8, 0x3, r10}, {0x8, 0x1}, {0x8, 0x2, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}], {0x10, 0x6}}, 0x8c, 0x2) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)) syz_mount_image$squashfs(&(0x7f0000002080), &(0x7f0000000d00)='./file0\x00', 0x1, 0x5, &(0x7f0000002000)=[{&(0x7f0000000d40)="145f91fe48a4b67b745ab53914352d338d47c55e51308dbd7bfba784002070b55186754deb316878f9f016daca472a66e232805c146c885607e66ec07ed1851e4db403b79c2aef8f7f59367d6df183aaa9c47619dfe874264fce9cfef3604528190535524736d821da50ca2a89f6ab1efb47b3b7e8111d8c212848df4aa14a7f1ebe809b2ae942ac25d14bdd3660adef1f193e9cb50849d61d59334762ec58fe0ae9412e222f19489868fa2231ae74c27f6d9bd32b9f33e24319e90b4206fb1ba07ea3de4473a38710b4043e0db2bd8f", 0xfffffffffffffed4, 0x9}, {&(0x7f0000000e40)="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", 0x1000, 0xa}, {&(0x7f00000020c0)="afc0c38d2e2f9e2d8e466b04ad2774bf01199ecc15a109a45f90af7c1a7a3ee757ad4c7461b6e6fc75fbbe0d55b54024dd0b6d61e5f7d0c6ed7a364d95736b25cbcbd16574588549105e77ba6dbd210705e0", 0x52, 0xffff}, {&(0x7f0000001ec0)="6688bb18e7350adc9bee2f3436f49b5890bd06c3cd1da25801a9052f128aff334ee08470ca0c007c2f22963fc5c97408abb272bced300e4457667367c32c003bd0313bb8d362d8eba08fd3ebabf4c0", 0x4f, 0x7f}, {&(0x7f0000001f40)="433ff06833778cf2d22440f618491b72bc09daa3c38372309af5ecf846b74d83583be81982e03b19f1d7073d8b35927dd2bdbd5d57ee646608ef7597e2ae2081b2ece5457534f68ee3188e70f5d7965501f4bae90f1b743e0b7ec87174dbfe696cc70e3f8c55f1cb94766a9c2df4846842b05ec6ff2f0e5c30e82bc1e2b10342676d2e1f6e98e63abb7de51436d17d2c5e03f6fe4a25d87032af5b49f505729777369f43c8d66fdd1eb004633355124c05fe10e628", 0xb5, 0x9ba}], 0x80041, &(0x7f0000002040)={[], [{@context={'context', 0x3d, 'root'}}, {@obj_type}]}) mkdir(&(0x7f0000000a00)='./file0/file0\x00', 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000840)={0x7, 0x8, 0xe5f0}) 06:01:00 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="8b01"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) [ 328.235924][T11682] IPVS: ftp: loaded support on port[0] = 21 06:01:00 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r2, 0x0) preadv(r2, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000080)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8dd0f0f6300bfc7442402c43a727fc7442406000000000f011424f30f090f013a360f0666b8c0008ec066baa100ed", 0x4e}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000100)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000004cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = openat$ipvs(0xffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x2) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x4, @perf_bp={0x0, 0xa}, 0x12, 0x200000000000000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4bb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) [ 328.670729][T11684] IPVS: ftp: loaded support on port[0] = 21 06:01:00 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) kcmp(r3, r1, 0x2, r2, r2) [ 328.806404][T11713] loop0: detected capacity change from 0 to 264192 [ 328.873396][T11713] nfs: Unknown parameter 'v7' [ 329.492707][T11748] IPVS: ftp: loaded support on port[0] = 21 06:01:01 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000000180)=0x101, 0x4) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e25, 0x0, @empty}, 0x1c) getpeername$inet6(r1, 0x0, &(0x7f0000000140)) openat(r1, &(0x7f0000000040)='./file0\x00', 0x10000, 0x4) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) [ 329.685640][ T1988] block nbd4: Attempted send on invalid socket [ 329.691961][ T1988] blk_update_request: I/O error, dev nbd4, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 329.704951][T11745] VFS: could not find a valid V7 on nbd4. 06:01:02 executing program 4: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) kcmp(r3, r1, 0x2, r2, r2) 06:01:02 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, 0x0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(0x0, r1, 0x2, r2, r2) 06:01:02 executing program 0: r0 = syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)=@xfs={0x18, 0x81, {0x0, 0x1, 0x78, 0x80}}, &(0x7f0000000100), 0x0) mount(&(0x7f0000000180)=@nullb, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x1109465, 0x0) [ 330.473168][ T1988] block nbd1: Attempted send on invalid socket [ 330.479568][ T1988] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 330.510791][T11777] VFS: could not find a valid V7 on nbd1. 06:01:02 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="2f6465702f6e62644d002bebad5f44a766c3f7e1f619dcfa88af55d9e8649123005312826a8d0d556d03f257db72f80ecdf2466d2eb1efa4bd8078805ba7735004d29639dfdeec4041f0329703953ee7ac6c3dcdad516e0e6a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r3) mount$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x1200804, &(0x7f0000000200)={[{@huge_never}, {@gid}], [{@uid_lt={'uid<', r1}}, {@obj_user={'obj_user', 0x3d, '/dev/nbd'}}, {@euid_gt}, {@audit}, {@smackfsfloor={'smackfsfloor', 0x3d, ',#D+/'}}, {@obj_user={'obj_user', 0x3d, '*'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@dont_appraise}, {@uid_lt={'uid<', r3}}]}) symlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00') [ 330.954332][T11782] IPVS: ftp: loaded support on port[0] = 21 [ 331.010554][T11783] IPVS: ftp: loaded support on port[0] = 21 06:01:03 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) kcmp(r3, r1, 0x2, r2, r2) 06:01:03 executing program 0: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_GET_SCAN(r3, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r0, 0x300, 0x70bd26, 0x25dfdbff, {{}, {@void, @void}}, ["", ""]}, 0x14}}, 0x4000044) sendmsg$NL80211_CMD_NEW_INTERFACE(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x54, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x73}, @val={0x8, 0x3, r4}, @val={0xc}}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x6}, @mon_options=[@NL80211_ATTR_MNTR_FLAGS={0x8, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_ACTIVE={0x4, 0x2}]}], @NL80211_ATTR_IFNAME={0x14, 0x4, 'bond0\x00'}]}, 0x54}}, 0x0) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x3000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x20, r0, 0x200, 0x70bd28, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4000845) syz_genetlink_get_family_id$tipc2(&(0x7f0000000240), 0xffffffffffffffff) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) [ 331.779945][T11800] tmpfs: Unknown parameter 'uid<00000000000000003327' [ 331.855346][T11829] tmpfs: Unknown parameter 'uid<00000000000000003327' [ 332.071785][T11833] IPVS: ftp: loaded support on port[0] = 21 [ 332.260041][ T1988] block nbd0: Attempted send on invalid socket [ 332.266423][ T1988] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 332.289421][T11832] VFS: could not find a valid V7 on nbd0. 06:01:04 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="2f6465762f6e62643000440f48ade9112bd876731075f56ea93114461fdc6c263fe0a1451563c5f1dce05c9765920a2dd5fde28760f65039a30afccab4c11477e501cda1d755f3b31504b08406d3985d54b4c3664b57d7ff6cfed57133976a8d93098e95"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) [ 332.360775][ T2038] block nbd0: Attempted send on invalid socket [ 332.367717][ T2038] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 332.387779][T11843] VFS: could not find a valid V7 on nbd0. 06:01:04 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, 0x0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(0x0, r1, 0x2, r2, r2) [ 332.905803][ T1988] block nbd0: Attempted send on invalid socket [ 332.912104][ T1988] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 06:01:05 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r1) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x5c, &(0x7f0000000200)={[{@workdir={'workdir', 0x3d, './file0'}}, {@xino_auto}, {@redirect_dir={'redirect_dir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file0'}}, {@xino_off}, {@xino_off}, {@xino_auto}], [{@fowner_eq={'fowner', 0x3d, r1}}, {@pcr={'pcr', 0x3d, 0x1a}}]}) [ 332.951424][T11858] VFS: could not find a valid V7 on nbd0. 06:01:05 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r4 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3001000010000104000000000400000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r3, @ANYBLOB="e68d9028d200100000e88cf2fa6a39e3b5c04defd2df4b1399f1a49616b251048a4662ea56b2dcb231564c0a5424a6f5db3a"], 0x130}}, 0x0) recvmsg$can_j1939(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000200)=""/130, 0x82}, 0x40) [ 333.527418][T11882] IPVS: ftp: loaded support on port[0] = 21 [ 333.568305][ T2038] block nbd0: Attempted send on invalid socket [ 333.574837][ T2038] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 333.635194][T11883] VFS: could not find a valid V7 on nbd0. [ 333.668123][T11885] overlayfs: unrecognized mount option "fowner=00000000000000003327" or missing value [ 333.710145][ T2038] block nbd0: Attempted send on invalid socket [ 333.716639][ T2038] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 333.735579][T11883] VFS: could not find a valid V7 on nbd0. 06:01:06 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_ima(&(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), &(0x7f0000000240)=ANY=[@ANYBLOB="0407b7d5e3de944acec2028bb18af5cde9c3e790afd2cee9fc124a72ccbe84aff6b16fd628209628dc01b81419ad0d1dcb3da8bf4984e1ba8bb72cf1b2e0474f4a8ed725e4b9769f2b40cf02b2b3225668b23996c863c520ad9247f2d52b74daa26940d9c07927b0d96f1759485785ce3833a092bfe83d7302cbe59ae5933ffb33b0ee05ddb7075d31269d226ed1c5934bab1619"], 0x10, 0x2) r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000000180)=0x101, 0x4) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e25, 0x0, @empty}, 0x1c) getpeername$inet6(r1, 0x0, &(0x7f0000000140)) openat(r1, &(0x7f0000000180)='./file0\x00', 0xa0580, 0x8) mount(&(0x7f0000000200)=ANY=[@ANYBLOB="2f6465762f6e0edff14184a0fa3d8d8d09d8657a75f3"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) [ 334.337951][ T2038] block nbd1: Attempted send on invalid socket [ 334.344642][ T2038] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 334.375493][T11910] VFS: could not find a valid V7 on nbd1. 06:01:06 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r2, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r2, r1, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) [ 335.144860][ T2038] block nbd1: Attempted send on invalid socket [ 335.151266][ T2038] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 335.163734][T11910] VFS: could not find a valid V7 on nbd1. [ 338.005026][T11924] IPVS: ftp: loaded support on port[0] = 21 06:01:10 executing program 4: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) kcmp(r3, r1, 0x2, r2, r2) 06:01:10 executing program 0: r0 = syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r3) getgroups(0x1, &(0x7f0000000380)=[0xee01]) read$FUSE(0xffffffffffffffff, &(0x7f00000003c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(r7, 0xee00, 0x0) r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(r9, 0xee00, 0x0) statx(r0, &(0x7f0000002400)='./file0\x00', 0x2000, 0x8, &(0x7f0000002440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000002540)={{}, {0x1, 0x1}, [{0x2, 0x7, 0xee01}, {0x2, 0x4, r1}, {0x2, 0x4, r3}], {0x4, 0x6}, [{0x8, 0x4, r4}, {0x8, 0x1, 0xee01}, {0x8, 0x4, r5}, {0x8, 0x4}, {0x8, 0x4, r7}, {0x8, 0x5}, {0x8, 0x4, r9}, {0x8, 0x2, r10}, {0x8, 0x2, 0xee01}], {0x10, 0x3}, {0x20, 0x3}}, 0x84, 0x2) r11 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r12) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x84009, &(0x7f0000000200)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}, {@xino_off}, {@nfs_export_off}, {@index_on}, {@xino_off}], [{@subj_role={'subj_role', 0x3d, '-\xae'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'v7\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '.]$\\'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@euid_lt={'euid<', 0xee00}}, {@uid_lt={'uid<', r12}}, {@measure}]}) 06:01:10 executing program 1: r0 = syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="0c00000081000000060000000100000001000000d6cf2a23e5aeb544d80c4df8e74b9cf2b529d5258beb32dba7ccabc957adc893fc3ccfc63af36b61c5c907abbd2660b098be1479da9f71cf5f9dec159c9ee68b68ad4ea7b2f41427"], &(0x7f0000000140), 0x1400) mount(&(0x7f0000000080)=@md0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='configfs\x00', 0x8000, 0x0) 06:01:10 executing program 5: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, 0x0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(0x0, r1, 0x2, r2, r2) 06:01:10 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r2, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r2, r1, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) 06:01:10 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) kcmp(r3, r1, 0x2, r2, r2) 06:01:11 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) mount(&(0x7f0000000040)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='anon_inodefs\x00', 0x80020, &(0x7f0000000180)='@\xfc,*}\x00') [ 340.548685][ T1988] block nbd0: Attempted send on invalid socket [ 340.554673][T11963] IPVS: ftp: loaded support on port[0] = 21 [ 340.555267][ T1988] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 340.578382][T11964] IPVS: ftp: loaded support on port[0] = 21 [ 340.583510][ T1988] block nbd1: Attempted send on invalid socket [ 340.590611][ T1988] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 340.596140][T11972] IPVS: ftp: loaded support on port[0] = 21 [ 340.603046][T11973] VFS: could not find a valid V7 on nbd1. [ 340.616331][ T1988] block nbd1: Attempted send on invalid socket [ 340.622915][ T1988] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 340.628186][T11960] VFS: could not find a valid V7 on nbd0. [ 340.634120][T11975] VFS: could not find a valid V7 on nbd1. [ 340.640773][ T2038] block nbd0: Attempted send on invalid socket [ 340.652419][ T2038] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 340.663962][T11958] VFS: could not find a valid V7 on nbd0. 06:01:13 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000200)='./file0/file0\x00', &(0x7f0000000240)=""/240) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000000180)=0x101, 0x4) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e25, 0x0, @empty}, 0x1c) socket$inet6(0xa, 0xa, 0x9) getpeername$inet6(r1, 0x0, &(0x7f0000000140)) name_to_handle_at(r1, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)=@FILEID_BTRFS_WITHOUT_PARENT={0x28, 0x4e, {0x9, 0x8001, 0x2, 0x4, 0x80010000, 0x400}}, &(0x7f0000000100), 0x400) 06:01:13 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='/d0\x00'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x148) 06:01:13 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r2, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r2, r1, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) 06:01:13 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) kcmp(r3, r1, 0x2, r2, r2) 06:01:13 executing program 4: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) kcmp(r3, r1, 0x2, r2, r2) 06:01:13 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2f6465762f6e5d983000"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000000180)=0x101, 0x4) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e25, 0x0, @empty}, 0x1c) getpeername$inet6(r1, 0x0, &(0x7f0000000140)) fchownat(r1, &(0x7f0000000040)='./file0\x00', 0x0, 0xee01, 0x400) faccessat(r1, &(0x7f00000000c0)='./file0\x00', 0x124) write$binfmt_elf64(r1, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0xa6, 0x74, 0x1, 0xda41, 0x2, 0x3, 0x1, 0xa0, 0x40, 0x270, 0x80, 0x8, 0x38, 0x2, 0x7fff, 0x3, 0x101}, [{0x8, 0x1f, 0xffffffffffffffe0, 0x10001, 0x3, 0x2, 0xcf8, 0xff}], "fb63c4ed39d0811a89eba132edc9620e38cf98d40962a8aaa3544c93c4a19cd13827da615718b4b86f3bd249d4e37bbfd6ee30f235c608b46e2be2e9e66d7902ff71d83d7b0303b6940214c0f09a2f94e50769f800541c6bf8d4eda3cb02423433bdf387ee0065934aea16795fcd805a99772f63ce49384f18be", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x9f2) 06:01:14 executing program 0: connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x7, @mcast1, 0x6}, 0x1c) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f00000000c0)=@nullb, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='anon_inodefs\x00', 0x0, 0x0) [ 342.801550][T12053] IPVS: ftp: loaded support on port[0] = 21 [ 342.803529][ T1988] block nbd1: Attempted send on invalid socket [ 342.814606][ T1988] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 342.819290][T12056] IPVS: ftp: loaded support on port[0] = 21 [ 342.830531][T12051] VFS: could not find a valid V7 on nbd1. [ 342.842842][ T1988] block nbd1: Attempted send on invalid socket [ 342.849135][ T1988] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 342.855395][T12067] IPVS: ftp: loaded support on port[0] = 21 [ 342.860412][T12061] VFS: could not find a valid V7 on nbd1. [ 342.982931][ T4677] Bluetooth: hci1: command 0x0406 tx timeout [ 343.088476][T11978] IPVS: ftp: loaded support on port[0] = 21 06:01:15 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 343.460257][ T5] Bluetooth: hci5: command 0x0409 tx timeout [ 344.280603][T11978] chnl_net:caif_netlink_parms(): no params data found [ 344.756882][T11978] bridge0: port 1(bridge_slave_0) entered blocking state [ 344.764801][T11978] bridge0: port 1(bridge_slave_0) entered disabled state [ 344.774811][T11978] device bridge_slave_0 entered promiscuous mode [ 344.866763][T11978] bridge0: port 2(bridge_slave_1) entered blocking state [ 344.874714][T11978] bridge0: port 2(bridge_slave_1) entered disabled state [ 344.884781][T11978] device bridge_slave_1 entered promiscuous mode [ 344.958383][T11978] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 344.994947][T11978] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 345.051295][T11978] team0: Port device team_slave_0 added [ 345.069833][T11978] team0: Port device team_slave_1 added [ 345.124849][T11978] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 345.132001][T11978] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 345.159425][T11978] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 345.176605][T11978] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 345.183870][T11978] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 345.210374][T11978] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 345.282709][T11978] device hsr_slave_0 entered promiscuous mode [ 345.295336][T11978] device hsr_slave_1 entered promiscuous mode [ 345.305660][T11978] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 345.314154][T11978] Cannot create hsr debugfs directory [ 345.533121][ T2068] Bluetooth: hci5: command 0x041b tx timeout [ 345.697279][T11978] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 345.747154][T11978] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 345.775178][T11978] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 345.818043][T11978] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 346.120540][T11978] 8021q: adding VLAN 0 to HW filter on device bond0 [ 346.164560][ T1986] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 346.174849][ T1986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 346.205889][T11978] 8021q: adding VLAN 0 to HW filter on device team0 [ 346.220686][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 346.230774][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 346.240139][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 346.247639][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 346.264255][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 346.297342][ T1986] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 346.307393][ T1986] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 346.317369][ T1986] bridge0: port 2(bridge_slave_1) entered blocking state [ 346.324860][ T1986] bridge0: port 2(bridge_slave_1) entered forwarding state [ 346.359568][ T1986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 346.379329][ T1986] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 346.398692][ T8460] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 346.409691][ T8460] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 346.421268][ T8460] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 346.462560][ T4677] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 346.473518][ T4677] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 346.494157][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 346.503977][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 346.544284][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 346.553854][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 346.577267][T11978] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 346.627979][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 346.636097][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 346.677613][T11978] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 346.876766][ T8460] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 346.887396][ T8460] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 346.970769][ T8460] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 346.981331][ T8460] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 347.005913][T11978] device veth0_vlan entered promiscuous mode [ 347.024259][ T8460] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 347.034182][ T8460] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 347.065897][T11978] device veth1_vlan entered promiscuous mode [ 347.171874][ T8460] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 347.183018][ T8460] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 347.212249][T11978] device veth0_macvtap entered promiscuous mode [ 347.235999][T11978] device veth1_macvtap entered promiscuous mode [ 347.291617][T11978] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 347.305123][T11978] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 347.315403][T11978] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 347.326014][T11978] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 347.336057][T11978] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 347.346802][T11978] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 347.356884][T11978] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 347.367661][T11978] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 347.377754][T11978] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 347.388502][T11978] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 347.403021][T11978] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 347.412695][ T8462] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 347.422451][ T8462] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 347.431935][ T8462] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 347.442068][ T8462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 347.483664][T11978] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 347.494434][T11978] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 347.504538][T11978] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 347.515414][T11978] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 347.525414][T11978] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 347.536494][T11978] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 347.546674][T11978] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 347.557335][T11978] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 347.567457][T11978] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 347.578130][T11978] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 347.591920][T11978] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 347.600017][ T8460] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 347.610443][ T8460] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 347.633079][ T8460] Bluetooth: hci5: command 0x040f tx timeout [ 347.659357][T11978] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 347.669302][T11978] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 347.678385][T11978] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 347.687516][T11978] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 348.011622][ T349] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 348.021573][ T349] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 348.112631][ T8893] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 348.141004][ T731] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 348.149087][ T731] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 348.162786][ T8462] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 348.357052][T12388] IPVS: ftp: loaded support on port[0] = 21 06:01:20 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000800)={0x0, @in={0x2, 0x0, @private}, @can, @l2tp={0x2, 0x0, @local}}) 06:01:20 executing program 0: r0 = syz_mount_image$hfsplus(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) statx(r0, &(0x7f0000000180)='./file0\x00', 0x100, 0x8, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(r4, 0xee00, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r9 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r9, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3001000010000104000000000400000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=r6, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r8, @ANYBLOB="e68d9028d200100000e88cf2fa6a39e3b5c04defd2df4b1399f1a49616b251048a4662ea56b2dcb231564c0a5424a6f5db3a"], 0x130}}, 0x0) bind$rds(r9, &(0x7f0000001c00)={0x2, 0x4e22, @private=0xa010100}, 0x10) setxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000340)={{}, {}, [{0x2, 0x4, 0xee00}], {0x4, 0x2}, [{0x8, 0x5, 0xee00}, {0x8, 0x6, r1}, {0x8, 0x3, 0xee01}, {0x8, 0x7, r2}, {0x8, 0x4, r4}], {0x10, 0x4}, {0x20, 0x2}}, 0x54, 0x1) r10 = openat$procfs(0xffffff9c, &(0x7f00000003c0)='/proc/stat\x00', 0x0, 0x0) sendmsg$rds(r10, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002040)=[{&(0x7f0000001c40)=""/167, 0xa7}, {&(0x7f0000001d00)=""/200, 0xc8}, {&(0x7f0000001e00)=""/218, 0xda}, {&(0x7f0000001f00)=""/167, 0xa7}, {&(0x7f0000001fc0)=""/70, 0x46}], 0x5, &(0x7f0000002180)=[@mask_cswp={0x58, 0x114, 0x9, {{0x1, 0x5}, &(0x7f0000002080)=0x4b3, &(0x7f00000020c0)=0x5, 0x3, 0x3ff, 0x7, 0x0, 0x32, 0x4}}, @zcopy_cookie={0x10, 0x114, 0xc, 0xaa}, @mask_cswp={0x58, 0x114, 0x9, {{0x5, 0x3}, &(0x7f0000002100)=0x400000000, &(0x7f0000002140)=0x8, 0x3, 0x3, 0x4, 0x2, 0x25, 0x3ff}}, @rdma_dest={0x18, 0x114, 0x2, {0x7, 0x8}}], 0xd8, 0x40045}, 0x4000000) sendmsg$nl_route_sched(r10, &(0x7f0000001bc0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001b80)={&(0x7f0000000440)=@newchain={0x1724, 0x64, 0xf483164c8c78dc10, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0xffe0, 0xfff2}, {0xe, 0xb}, {0x10}}, [@TCA_RATE={0x6, 0x5, {0xc3, 0x8}}, @TCA_RATE={0x6, 0x5, {0x5f, 0x7}}, @filter_kind_options=@f_flow={{0x9}, {0x30, 0x2, [@TCA_FLOW_ADDEND={0x8, 0x5, 0x7}, @TCA_FLOW_BASECLASS={0x8, 0x3, {0x0, 0xc}}, @TCA_FLOW_POLICE={0xc, 0xa, 0x0, 0x1, [@TCA_POLICE_RESULT={0x8}]}, @TCA_FLOW_MASK={0x8, 0x6, 0xc0000000}, @TCA_FLOW_KEYS={0x8, 0x1, 0x19d06}]}}, @filter_kind_options=@f_bpf={{0x8}, {0xc, 0x2, [@TCA_BPF_FLAGS_GEN={0x8, 0x9, 0x4}]}}, @TCA_CHAIN={0x8, 0xb, 0x8}, @TCA_RATE={0x6, 0x5, {0x23}}, @filter_kind_options=@f_rsvp={{0x9}, {0x1674, 0x2, [@TCA_RSVP_POLICE={0x41c, 0x5, [@TCA_POLICE_AVRATE={0x8, 0x4, 0x401}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x8}, @TCA_POLICE_RATE={0x404, 0x2, [0xb8e, 0xa4a, 0x1f, 0x1, 0x40, 0x6, 0x7fff, 0x1, 0x8, 0xfffff1d9, 0x4, 0xebf, 0x7f, 0x7, 0x6, 0x5, 0x3f, 0x1, 0x40, 0x7, 0x8, 0x20, 0x9, 0x4, 0xc7, 0x8000, 0x1, 0x2, 0xffff, 0x80, 0x5, 0x0, 0x3, 0x50, 0x7, 0x9, 0xffffce04, 0x7, 0x3, 0x10000, 0x1, 0xd53, 0x1, 0xce, 0x5, 0x3c86, 0x1, 0x1f, 0x3, 0x4, 0xb79b, 0xec2, 0x9, 0x40, 0x1, 0x2, 0x5, 0x0, 0x7, 0x5, 0x0, 0x8, 0xffffff64, 0x0, 0x4, 0x6, 0x2, 0x1f, 0x3, 0x4dc, 0x40, 0xfa0c, 0x8, 0x8, 0x8, 0x5, 0xfff, 0x7ff, 0x9, 0x20d6, 0x4, 0x8000, 0x8, 0x9, 0xffff, 0x1000, 0x1, 0x8001, 0x3ff, 0x7, 0x1, 0x8, 0x4, 0x401, 0x10000, 0x2, 0x1, 0x80, 0x200, 0x9, 0x1000, 0x7fffffff, 0x3, 0x5, 0x9, 0xfffff800, 0x8a88, 0x80000000, 0x3f, 0x3f, 0xe60, 0xfffffffa, 0xffffffff, 0x10000, 0x40, 0xb7d4, 0x9112, 0x6, 0x1b2a, 0xfffffff7, 0x4b6, 0x6, 0x9, 0x0, 0xf13, 0x10001, 0x33a4, 0x976, 0x6, 0x0, 0x4, 0x707, 0x8, 0xfffff1d0, 0x5, 0x7, 0x0, 0xdf, 0x4000, 0x100, 0x42, 0x9, 0x4, 0x80000001, 0x2, 0x3, 0x1f, 0xd6, 0x3, 0x20, 0x9, 0x40, 0x6, 0xffff, 0x51, 0x8, 0x0, 0x3f, 0x8, 0x80000001, 0xffffffc0, 0x3, 0x3, 0x0, 0x6, 0x800, 0x2, 0x2, 0xffffff3a, 0x10001, 0x7f, 0x400, 0xfff, 0x7, 0x2, 0x9, 0x3f, 0xfffffff9, 0x9, 0x829f, 0x31e, 0x1, 0x6, 0x3, 0x9, 0x4d10, 0x4, 0x9, 0x80000001, 0x81, 0x4, 0x4, 0x400, 0x0, 0x81, 0x9, 0x100, 0x1, 0x5, 0x81, 0x1, 0x8, 0x80000000, 0xfff, 0x9, 0x7, 0x5, 0x101, 0x3cd, 0x1, 0x7, 0x2, 0x3, 0x18000000, 0x2, 0xfffffffc, 0xe1, 0x8000000, 0x20, 0x28b64248, 0x5, 0x134e, 0x1084, 0x2, 0x7f, 0x80000000, 0x3, 0xff, 0xfff, 0x9a96b38, 0xdb7, 0x4, 0x9, 0xfff, 0x9d1, 0xfffffffc, 0x3f, 0x0, 0x0, 0xfffffff7, 0xa8, 0x8a0, 0x58ae48be, 0xae, 0x2, 0x1, 0x2, 0xfff, 0x1, 0x4, 0x0, 0x10001, 0x9, 0x2, 0x2, 0x10000]}]}, @TCA_RSVP_ACT={0x124, 0x6, [@m_gact={0x120, 0x0, 0x0, 0x0, {{0x9}, {0xa0, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x4, 0xffff, 0x3, 0x40, 0x5}}, @TCA_GACT_PARMS={0x18, 0x2, {0x4187, 0x8, 0xffffffffffffffff, 0x10000, 0x5}}, @TCA_GACT_PROB={0xc, 0x3, {0x1, 0x1ec5, 0x5}}, @TCA_GACT_PARMS={0x18, 0x2, {0xffffff81, 0x1, 0x10000000, 0xb740, 0x1ff}}, @TCA_GACT_PROB={0xc, 0x3, {0x2, 0x5d3, 0x8}}, @TCA_GACT_PARMS={0x18, 0x2, {0x80000000, 0xfff, 0x10000000, 0x4, 0x35}}, @TCA_GACT_PROB={0xc, 0x3, {0x0, 0x2276, 0xffffffffffffffff}}, @TCA_GACT_PARMS={0x18, 0x2, {0x7, 0xe8a5, 0x5, 0x0, 0x1}}]}, {0x58, 0x6, "a1f574e3418322c4bd72c233e624434f262d52a20dc74d039a69af7e7482ff25d5e3749fc5278f72a20f86fb93b8391540aae6a7ff0aefd54a5b378e6ab4c33e9b5a516f07c53cd027fda64dd05a2fe0b4e8874a"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x4, 0x1}}}}]}, @TCA_RSVP_SRC={0x8, 0x3, @local}, @TCA_RSVP_ACT={0x1120, 0x6, [@m_mpls={0xb0, 0xb, 0x0, 0x0, {{0x9}, {0x38, 0x2, 0x0, 0x1, [@TCA_MPLS_PARMS={0x1c, 0x2, {{0x10000, 0x5, 0x3, 0x80, 0x7}}}, @TCA_MPLS_PROTO={0x6, 0x4, 0x22eb}, @TCA_MPLS_BOS={0x5, 0x8, 0x1}, @TCA_MPLS_PROTO={0x6}]}, {0x4f, 0x6, "9704d40da70547befff5c4fed20b668a2fb55ee49a260fb41e3320f19f2cd4897f85c5986ca5409c1f1045c1377293c172a77c446869eb9ad20980039432fd56b3de097d875ac2d2687d5c"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x0, 0x2}}}}, @m_gact={0x106c, 0x1d, 0x0, 0x0, {{0x9}, {0x40, 0x2, 0x0, 0x1, [@TCA_GACT_PROB={0xc, 0x3, {0x0, 0x678, 0xffffffffffffffff}}, @TCA_GACT_PARMS={0x18, 0x2, {0x3, 0x1, 0x8, 0x1000, 0xc9}}, @TCA_GACT_PARMS={0x18, 0x2, {0x7fffffff, 0x20, 0x20000000, 0x4, 0x7}}]}, {0x1004, 0x6, "03f1fa1cc8719f9aef288efc3dd4bf8637878c934dc5e8aa41565f39b651ba70ec1189fbb1a3d68064aee4b4f39fc6c1e3fb4d90adbc15ff623127551ea1441fa0d4e81b3dcad70af7243fdf60e4dc088b387cb97e1afb7c3d1dc1e4e75fd35b3ce40f315cb60a1db87efe242e3b1f6a03aa15aaa843ab91d85cca9a52ae17bb31236628fe87031d00f60d0d80e505199ad7e7be21a6e6eaaf0f0c63cf444e27d7971a4e049ffb888d257cbc61582fc9b865d24334acd5d90a8b3d7f986256404f992f9c12f8d1e0aa25afda9fdc28123fb1ebdf0bc26a39e59d880d117c59c39434d4bfbfc52b6e01ef4c8ff6c2bbec6fc00adfd70ac2280904faaebb3c4b4b1bb5bc297a98e7450d4074deef4ad53abd418c546d377865d7bf508ba38aa419b6183b741b98ae493a438a5ad5e6b58521d9fc71c19bfb0cf095f681a7aacb8cdffbfd91479aa2b63d33478d2118a98ad28f2b54c98b95ca71e38e1aa87d959aa7a2b244940c1ec5db7d4633f0dc8213a262bdd5ab751c48e53dc2d53d1d76aaf187ed989b14c43f4357a3d0d5751507e8420faa795c1f35e6e71358a585ba12c0a01ea5bd166ae5bdba75969284a232c2fda7cf6d38bfec27b9fa053ce61ec7355ea56e6244f196117d1efff23fde9aa8b984c96e1c78d475dd23068e7ee6a5999a74be47881e67df272e926be920753e2638a71e0bf14aa349d44eb3f684e700b6e5b5af131ad4b0a76b1dcd7962c8774bb954571c70cb9361fed556b4013384a7d86b7d23fa5130730e98ff41db89c749855e92c24c99fb5f8acea03f5750b91d3c676ec2158d648fca37393a8c6b095e8fed7982b80de0c1eb02f8a712ad7bcdabf4c5692685f3ffe0cbee6704cd21343500097db75f1b3ab6fc84aa4c6e252c5d6e7881f681f6caf2b57404df59a53f179b55b11427716badc1711995b5dcd15e4c755167165a26c7733d818d454b3d5a9dc0b993a7027e9f5df666dfdf17d12f03867856786b26de29405b5121724a084eb10ed5caf3db1771ad09fb10bd0ee18351723979cb82eaa3ec9397817c805895642e73cd76eb8afed6ba11f70d59753d461a947e701f0635a7e2c03d4dd3f91a6184ed245fee26037f23b9b261a6e7cb4c28fd1bf0433b9db27fc641e57086e42de85de0efb8811f1558046fbe9b084423be304e8848ef80905c2cc610c3fc137131ea1e915e3e86738586a721c587098560c7c54d559fdb4ccee1d0ee0822192b3ecffe45438b83559381bbe65ca95198b7c7f1a2a5958ce33a306e48219d1f09748ee716ec4c995f3f90be55a2d05f35f767525bb8f8ced91aa36744072627d80a1cd8fae8406ff1d31b35e8fe82efa9de7e6f2549b28f3978798241d5a7da79a2c03cb62dfb1b46b60643a85fe3a463754e192297abece7c210e453cdb85ae071a81f60dedb9028a6a658229b2616acce133088ec821d8279edd4f5b428e2760606bc376a25431cc5aaf69cf3415c5e531bfea17eed18435ebe626be67056e8c5fd72f81349c91c982460db592fce6c4c4f3c071e4aec0935ce4295f64327501509d3985d97a37714432d7df678ab278c069bc5fc7c0cffd54efdf2da1adf26f52b5b264c2af68f4e016677c7749f3c2690ff7154dc8ac5311d48046bbb3c13e551c3512d7336cc3a8ae98b85890ce11f01f277e12386d4ecab991de49049e1ed05481346bbf176ebc71f35f0fbeb91ff900fd8dab42fd7f5a13d691dff8b6d603d99aadb45363986e79eae9f44205c6f24b606a8e36f1f2510ac82c0fa3956779dc084cf581c067c77ecb6b11a2dac4787034527521811b5ecf2967c38e6cf3f7616af27497883625804a625b8ae5acc7f72e21594659e6ee61c41a441f26b341e0fd9b9f09b223e6f7c714c69c2c8223ec8f5e3b7365db319a0e134ee93fce019c627921c21a61a2ddc9c0b338942e5937af39e933f86375291007710da3014b1668aec00fb2fb987afa3daa6660823111c9e62eadd765690e7d7feaba187990780b7f274f1e3c9a0dbe30db0dffa4333da0b40ad0392f8009aad8899fb3ecc3d9351b567970b5a93cc5fa5ed16aaa9b3529db32107bf57bbb6285709272a60fdd653635e09c358b0879a126f97433451e03f3f6829716af42fc04cbe4e94eb573ba3524243afb0e4654f531f2f30bec9f8787c9e3237aae4bcf4dcd9f238c82082ec869744ec2dead4f0186ce2c54eae9b5f61b682f0fde59ad94d0031511b08359fdd31da1ca5b18f7c2449a468ba4d40a685a6d75d3323c24a2aa7493370419fa7d073dfdc030b3c3b074a9b620f11a2b2a9af9f9b93ee2391c4eda99049a1cbe518e1b004302dee8442d46e2e4b1253e47805435aee1cf39514308e2c05950930e82c06759ab66b4006cd18eed7d60f9e02df7d27b20c36d1263401f40417cb37a3e32418d6267e912533c08844670390cdc1676d595786a67a84130cd504da9ec8aab156c1bd337e9cf7464eba5f6f2a30ee233be0a0b5f3554e827d94f7a20eb3763463fb5380b44a589f6d96ddce1cc7d8162f5a4a024adf9d001d3506dc3e336d141dffc919acf0c76af2c9d8f85da0b66f3a8d6b54f2efa3d94203e85877a598f008d79b93391d6d5da176d20fde824d50002d51334f765d9f1c057ad110ffa2ac53d520d97464575391bb7487c7fae98595c9f6a2b874ee1adbd926c1c9fb223302f49894484973487510bb84e1797e801eeb4d6f93c53440a34c5beb0dd5132782c96b8d3fffd6f8b06ace8aede71e89b98f3b98a02f9acaf9079efda1bb238698548ea84105b077e6887e0a6acae2695c6a6727f5a10063d439aaf2ef90c9f120f509fb604ce08c371df2a23c88a52007e6a89432293e7fe0553a16629f22d1eddbbb84c2a33449c6b16e03e3bbb6092c649601084d45966baa2a2e83835ee470c326aaa738f547a9d088a490603b2d6cd9b6f270b617f2caf09f2c5cbbaa79c7eb1505676187e60e94e42798dfce0a5afd075cdff86b0248f8b1756120c6fc01e493a0876ea58e5de5fdf34eaf31d956379114b54e57901cb13d600e5e3ed5b3809de6ba2556b36889758523807e1230e78e71e1497bc5637e455a6212539b25cf7bc993dc6a9dfaf08d0171b3ac705aa58cb5b7e7490a69f20a765b61c6fb8dc5cb779feacafdd90aa950a7515abf1a86771f6d2fae41c0885463234b7ae79a8959ec69ca102eafe68c8f6af4d423e03de89f0f91db0d92cc27228a698e1ababe52e99b00422c56b664d918421d4983f9128dabf7a4284ddd7ca5a6c6e0cfdf53e228263c0ecddbd3adbafc45eacb3ec84acd242b4c021daeaa266c3a1292ef2a0d348e67fd65ad2a5fca5c4adfe55a68a0085bb6e4057b0637f2da0f133106ae7dbca63898d89826c6cd3c3a37f5564be6dd80246fc2c464c23c27bcc44fd920503e047cb84959f4a99b00c5cd78631fd490d65eff98b750e2ed2abb7087eacc7ac88f4fa61c3b358d24ddaf6354c87703cb40f17c86a375c29e00136000457a7e01190f3adac5dd7ad17044e65cc4836784eb8e04a5d600cc734cc9845db3b21bc069e17724517b0c35dca1cc98d3e8f8ecb29e0ab37b0ad299647d1c56ed4bca289fe6898c7760571409a9f248aaf556f21835ca3b34f4b405943cc8b59e12a253925c6e8bb1cce7e77089303c3a477ad8c9279fe20786c59c4bc5370bc048c3aa1a05b7831f0f50e7af115a197998be405ecde6ddbae840c26a7f1bccc016ed62ab8fffaab6e9091aad911840969caf860aeccf0383c2554a519b1fa8b87df58e15766b19934c08529d63e931288f12c1f51c6f8339f9200556aa3e956378243cf15e450d2d9b777bcdf9c6cb84f1285ac0fb51ef14ecabef45a3ab64395b178a3ae680d96ca069104e32ecb737d78f334f71a0578c033e8930af1a9adc626921aa41426d2f4c85eff3cadcb4444224fd09e4a6dba296d66f48303cf2684eb18cc91c3b04a4080c434d11ee76fb7900810fe8f0f37e82d6b275d0a47f0d766cf6dde232a446de455b56effbe23c16311082419d2e13052f0a32ea70cac69433e4a2da554fc993152f911fe81748a9e7d23bf612494f4632db503e2b15d7cb815940a1fa3d941fc1590487c89fc5d2a4985950b84d87338fb0e18e61f89478c5d6c218baaad7307d518f3c665d70024b1ab9617888c73e73748daff5d95b36c3a128f2811cad99c47d50358f99fe04807ff2d663c013648d528ae02bcc7902adcf9258d4ea15dabae82a7c9801b0203898aea9a9443d2fdd90cc1381c6d8881593b007bbfa4b369e3e4efe277db9b1f24080a9daf9bd123ab0ab6451c680bf0ab34cb000e11130bbb31eab8404696c1af27e45a3df7a66a70d57ad1134f17a7b1a914ac3b6d1f95346f75c2d680275fb5884e28809a412519124db4dae9557d69af1fa65eea9203a0cacff8343b2bf80e582ac8ed05a9c2d7aadad76d66213d186b8c5828aaaa75a3b854386d60b2dbe998f0add2e3248255695cc3d67b1682636f4c7db69196e1aff3912ca9b3f0f518efd62fac1309dcdc816c64827a633ad651f71e4979818252285e8c96e711a76226e0fd03c04ee5b2efc6c0150afeb662c0ff28019aa1d7f3be4a321c1692988b7bb615c57ad6a250b834924517fa6ae4d0e1ac23c9146827af3b644aa55eb490bb01f8bf4f36c3cf5e98d948bf6deede49fc5b60794358e07a9712fd6b7a919cbaf9e9f15cebc200057c910be6081f654d8fe1f107fe376f53f4465480b80aeca8c31a14fba0f8284f611f709cb6c97a599c74fb7562902455c008f91f1b954e07f98d608857f8f823ce8f1ec92644c4a02beb132d966e07a8b9b2472506394e16fa9b9000c805ad00c29c3944c77249b7cc1ae230c78a47c4690af797de379a97892f6ee6f49794deaaadd912f73f3f36953b2c45446cc5fe8ffde90d08d05e95b31bb34decaf37660b1fda03af274b7c3684d645bc5475fb5c50bc7235483c07dc740074c39cd61c9459bb53a2eff4bcf750c34882abbb448eaa79454cac068ae86a28a7a04ba0f2ae98fa0e0198c72fd313b398eb7e98c2b7826928f775ee0ba0385ca6c228818e7d43da9d86579ac248389b5ef88a54a7cf0cbc0de9919a5fd81435d3f5d734308c00a3dd121145ed2472bed85594ed0821e8fb1bbbdad174e74c10cc990daada9aec71050fc6da1917f7ae8394033ad2ec1ed5b58ac56ca8fa69d2c98807337289ccf15eccb7e262b32608af95fc7522d3992c60a47d0a97d04cb52365e0ac857933f44d0547e6ba4dd80a00ea955254c6ded8f50b05976a0f7240c6082c17a0c5ed541a4a114beafddbb66db390678bae78708cef98c03c1a09780ad811cdc2cf32cbd30498a7888583159766738077394e1dbc58bbdfdadca373dd156f3d17b90114dc80130dfd9931e3ba2a0273ff7f35801ba573bfb82cd6e3f27e9e6e6f82dc9d67df6a36dd23a1d2fe7eb5d6cbc0995a6d2611d340d81db361f14942894a1424b668ce627bfc0bed4a3c1d867fa4d6b5f281b2cc47e5e3b1e59c14f375d16a9858fa8a14ddc047c55425797841ed8847fb96ac71c40309448a559408b773e7f4edc4e002fc9afb61d0f0f75b37b8de5da969a950a57cd821a997ce3be6424435d33a1ed6970ccbc217c39a366c9e62430fe2534fd037ae606209e2c910e3e5980f49cfa5c345229fd7240fc4c1530d125a43983836768dec7e7360912a27d7bd480f39408c570c4a4f851fd626cdc6caaa1a9f3020b7e47a0a2f0b423b15025114eb87f26"}, {0xc}, {0xc, 0x8, {0x2, 0x1}}}}]}, @TCA_RSVP_DST={0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}]}}, @TCA_RATE={0x6, 0x5, {0x3, 0x5}}, @TCA_CHAIN={0x8, 0xb, 0x9}]}, 0x1724}, 0x1, 0x0, 0x0, 0x80}, 0x0) 06:01:20 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000100)=0xe, 0x4) 06:01:20 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) kcmp(0x0, r1, 0x2, r2, r2) 06:01:20 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:01:20 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x7, 0x4, &(0x7f0000000100)=[{&(0x7f0000000200)="6adf4bfd823d2ffc07a416a0ffa67da77087fb9a86d6fa18a21e1d3d5874815f34884b07a2f596b97e63890c988b87919dc962b83e64422de5712a81ae1a29be78907b45fca2b6f6444328ddfcc648b874a0d5f995f15f1f356e1d31e2c7592c93a1787ee229b5521299f7d23056e6375301b8", 0x73, 0x80000001}, {&(0x7f0000000280)="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", 0x1000, 0xfff}, {&(0x7f0000001280)="7eaebd437060ca10eed61bd0837574a2c6133d3231f7d3571d02f2fbf1952069bff9bd694b140acccbb071dcd4dda587593151a1534669262885f5103603c9f3223c6bcad06d4aa726947a9b0732c65453aab50e4b31c603beed2d5c5ef07b55c2eede475e2f61a7de8256087d4a2700fbf66fc3678d06b874abe36e", 0x7c, 0x81}, {&(0x7f0000001300)="12704b13708dd70ecee085c0094842efea403ee88b196a8b00e13d4a7a3dc1c2d2748acd17e85b3f98816138f39fac32e6091deba342568f333b04bfd9f2836f20be9e7a84f984355416fd9254", 0x4d, 0x5}], 0x1840000, &(0x7f0000001380)={[{@noloccookie}, {@upgrade}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@audit}, {@permit_directio}, {@smackfsfloor={'smackfsfloor', 0x3d, 'v7\x00'}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@dont_measure}]}) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) [ 348.937548][T12416] IPVS: ftp: loaded support on port[0] = 21 [ 348.965521][ T1988] block nbd0: Attempted send on invalid socket [ 348.971898][ T1988] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 348.992997][T12417] VFS: could not find a valid V7 on nbd0. 06:01:21 executing program 4: timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040)={{0x0, 0x989680}}, 0x0) [ 349.197534][T12425] loop1: detected capacity change from 0 to 264192 [ 349.284733][ T1988] block nbd1: Attempted send on invalid socket [ 349.294832][ T1988] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 349.307770][T12431] VFS: could not find a valid V7 on nbd1. 06:01:21 executing program 4: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000001c0), 0x4) [ 349.427857][T12428] IPVS: ftp: loaded support on port[0] = 21 [ 349.519693][ T2038] block nbd1: Attempted send on invalid socket [ 349.526106][ T2038] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 349.540763][T12431] VFS: could not find a valid V7 on nbd1. [ 349.694047][ T8460] Bluetooth: hci5: command 0x0419 tx timeout [ 349.779943][ T1988] block nbd0: Attempted send on invalid socket [ 349.786563][ T1988] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 349.802873][T12420] VFS: could not find a valid V7 on nbd0. 06:01:21 executing program 4: msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000000)={{0x1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) 06:01:22 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='/dev/nbD0\x00'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file1\x00', 0x0, 0x1c}, 0x10) 06:01:22 executing program 5: socketpair(0x2, 0x1, 0x0, &(0x7f0000000540)) 06:01:22 executing program 4: r0 = openat$drirender128(0xffffff9c, &(0x7f0000001200), 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x4c01, &(0x7f0000005500)={{}, 0x0, 0x0, @unused, @devid}) 06:01:22 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r4 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3001000010000104000000000400000000000000", @ANYRES32=0x0, @ANYBLOB="202002000a2a04000001128009000100766c616e00000000f00002800600010004000000040004807c0004800c000100040000001f0000000c00010007000000010001000c000100fc030000e43900000c00010008000000090000000c000100ff070000730c00000c000100e7d10000050000000c000100a3ca0000010000000c00010002000080fcfffbff0c00010008000000aea100000c00010009000000bf890000640003800c00010009000000e52b00000c00010000000000080000000c00010009000000000000800c00010002000000080000000c00010005000000003000000c00010005000000d82e00000c000100010000000a0000000c0001004cad00000400000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r3, @ANYBLOB="e68d9028d200100000e88cf2fa6a39e3b5c04defd2df4b1399f1a49616b251048a4662ea56b2dcb231564c0a5424a6f5db3a"], 0x130}}, 0x0) connect$pppl2tp(r4, &(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x4, 0x1, 0x1, 0x2}}, 0x26) r5 = syz_mount_image$hfsplus(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffffb, 0x0, 0x0, 0x2000, 0x0) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/207) r6 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_int(r6, 0x29, 0x21, &(0x7f0000000180)=0x101, 0x4) r7 = dup(r6) connect$inet6(r7, &(0x7f0000000040)={0xa, 0x4e25, 0x0, @empty}, 0x1c) getpeername$inet6(r7, 0x0, &(0x7f0000000140)) socket$inet6(0xa, 0x5, 0x3) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000840)={0x0, 0x1, 0x6, @remote}, 0x10) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r5, 0xf502, 0x0) openat$zero(0xffffff9c, &(0x7f0000000340), 0x1, 0x0) renameat2(r7, &(0x7f0000000040)='./file0\x00', r5, &(0x7f00000000c0)='.\x00', 0x2) 06:01:23 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) statfs(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000200)=""/85) r0 = open(&(0x7f0000000040)='./file0\x00', 0x626040, 0x80) r1 = pidfd_getfd(r0, r0, 0x0) fcntl$setstatus(r1, 0x4, 0x40000) 06:01:23 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) kcmp(0x0, r1, 0x2, r2, r2) 06:01:23 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, 0x0, 0x0) [ 351.439490][ T1988] block nbd1: Attempted send on invalid socket [ 351.446015][ T1988] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 351.519091][T12515] VFS: could not find a valid V7 on nbd1. [ 351.545817][T12521] IPVS: ftp: loaded support on port[0] = 21 [ 351.778764][ T2038] block nbd1: Attempted send on invalid socket [ 351.785249][ T2038] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 351.797633][T12515] VFS: could not find a valid V7 on nbd1. 06:01:25 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:01:25 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8942, &(0x7f0000001840)={'gre0\x00', 0x0}) 06:01:25 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x21ce40, 0x2) 06:01:25 executing program 5: pipe(&(0x7f0000002600)={0xffffffffffffffff}) fchdir(r0) 06:01:25 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) kcmp(0x0, r1, 0x2, r2, r2) 06:01:25 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000540)={&(0x7f0000000300)={0x208, 0x0, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0x5c, 0x8, 0x0, 0x1, [{0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xc6}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x340e6a1a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x84}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xc3}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x251c4890}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x12}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x115f8cc5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x23}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x44b6f11a}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x98, 0x8, 0x0, 0x1, [{0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xb51a245}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7569b17e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2a9e14b3}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x32290dcb}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1855da4e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8c}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x16aaa6b6}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x56cc95f3}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1a}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7c280f91}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7c76e6f2}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xfc}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7c4d388}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x341e0d49}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5b}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_MLSLVLLST={0xe8, 0x8, 0x0, 0x1, [{0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x31}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x57}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x79f636e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7093a740}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x33a31641}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x35e680e1}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x94}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3d95f2f1}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6964d76c}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x80}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x809e334}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1c}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7eaa373a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf4}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x77}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x503df356}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7b7ac8fd}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4d29088d}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7b48682a}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x9}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x59}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x85}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x79}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x49fdc9df}]}]}]}, 0x208}}, 0x8c4) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$IPSET_CMD_TYPE(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x70, 0xd, 0x6, 0xa03, 0x0, 0x0, {0x2, 0x0, 0x3}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'list:set\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x70}, 0x1, 0x0, 0x0, 0x2004c014}, 0x40040) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="2f64e57207ee557a860947400c74eaee2f6e626430004d7b0d37ec9ec45fa22d15fafafccd5449c9ddcbdfe5bf15634b20c5e64d24e0f1e5261ed595e1ff9f0949a9dbee189fa53aa285b0c18a3431cca82f051d80223bd872825a769e66f8febc2f4191600b903cf0e0d667aa0741e0b3a208f05aee"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) [ 353.827882][T12565] IPVS: ftp: loaded support on port[0] = 21 [ 353.948716][ T2038] block nbd1: Attempted send on invalid socket [ 353.955389][ T2038] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 354.007966][T12571] VFS: could not find a valid V7 on nbd1. [ 354.174656][ T1988] block nbd1: Attempted send on invalid socket [ 354.181115][ T1988] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 06:01:26 executing program 5: r0 = openat$drirender128(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_HANDLE_TO_FD(r0, 0xc01064c1, &(0x7f0000000100)) [ 354.262872][T12571] VFS: could not find a valid V7 on nbd1. 06:01:26 executing program 4: r0 = socket$can_j1939(0x1d, 0x2, 0x7) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, 0x0, 0x0) [ 354.494808][T12598] IPVS: ftp: loaded support on port[0] = 21 06:01:26 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000000180)=0x101, 0x4) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e25, 0x0, @empty}, 0x1c) getpeername$inet6(r1, 0x0, &(0x7f0000000140)) name_to_handle_at(r1, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="0800e82e9b6d334f72f3001c3f000000"], &(0x7f0000000100), 0x1400) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x201081, 0x0) 06:01:26 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='anon_inodefs\x00', 0x20000, 0x0) 06:01:27 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) kcmp(r2, r1, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) 06:01:27 executing program 5: getgroups(0x1, &(0x7f0000009100)=[0xee01]) 06:01:27 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:01:27 executing program 4: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x18, r0, 0x1, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) [ 355.529094][T12631] IPVS: ftp: loaded support on port[0] = 21 06:01:27 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='debugfs\x00', 0x8000, 0x0) 06:01:27 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2f6481762f6e62643000"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0/file0\x00', 0x0, 0x10}, 0x10) [ 356.229403][T12656] IPVS: ftp: loaded support on port[0] = 21 06:01:28 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) recvmmsg(r0, &(0x7f0000004400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 06:01:28 executing program 5: mq_open(&(0x7f0000000000)='}-\x00', 0x40, 0x0, &(0x7f0000000040)) 06:01:28 executing program 0: r0 = syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=""/117, 0x75) openat(r0, &(0x7f0000000000)='./file0\x00', 0x104000, 0x40) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/dev/n\t\x00\x00\b0\x00'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x5f03628dacf960ee, 0x0) 06:01:28 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) kcmp(r2, r1, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) 06:01:29 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000003c0)=""/238, 0xee) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@private0}}, &(0x7f0000000100)=0xe4) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x2000000, &(0x7f0000000300)={[{@default_permissions}, {@xino_on}, {@index_on}], [{@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@uid_lt={'uid<', r0}}, {@appraise_type}, {@func={'func', 0x3d, 'MMAP_CHECK'}}, {@hash}]}) [ 357.346918][T12698] IPVS: ftp: loaded support on port[0] = 21 06:01:29 executing program 5: bpf$ITER_CREATE(0x21, &(0x7f00000008c0), 0x8) 06:01:29 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:01:29 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) [ 357.603915][ T2038] block nbd1: Attempted send on invalid socket [ 357.612658][ T2038] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 357.646163][T12702] VFS: could not find a valid V7 on nbd1. [ 357.673985][T12703] overlayfs: unrecognized mount option "fowner>18446744073709551615" or missing value 06:01:30 executing program 4: r0 = socket$pppoe(0x18, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, 0x0) 06:01:30 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) kcmp(r2, r1, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) [ 358.103878][ T1988] block nbd1: Attempted send on invalid socket [ 358.110273][ T1988] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 358.145297][T12703] VFS: could not find a valid V7 on nbd1. [ 358.155206][T12728] overlayfs: unrecognized mount option "fowner>18446744073709551615" or missing value [ 358.374666][ T1988] block nbd0: Attempted send on invalid socket [ 358.381090][ T1988] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 358.396624][T12731] VFS: could not find a valid V7 on nbd0. 06:01:30 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_netdev_private(r0, 0x89f1, &(0x7f0000000200)="e8aa9c6a7f80f7a0ecfa284900d2f6058d1d8916b893b4010b8c31a302badb01049fa7b54f71d29a64d2038a076bbf0b6776ce97ad2dec22442ae8a05284b6c52d78c4d58dab33830e38ae0b39fd2ce887e3be68e5999953de1373de59013aec7ef69318c853be88d9b94fa71aff45cbb8fb6f401bf57ea02084761ae9eaae3a692677043a6b2940ce12177a79a786760bda27606aca44aeeba1bf02e89dbae78067a9f79c9b9330742991a69d9da3dfc7fd9ad1d764a18c") syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="2f1f0000006e6264a73563ef2622df369f71745a7e9d0c46f3b65d99793e7abbd8f5e795c592e64592626340ee94af77d55fafb389147030e558a24f19fa39475a99479191e5ee"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) [ 358.502058][T12733] IPVS: ftp: loaded support on port[0] = 21 06:01:30 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) statfs(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)=""/248) 06:01:30 executing program 5: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='fd/3\x00') [ 359.206229][T12750] IPVS: ftp: loaded support on port[0] = 21 06:01:31 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000002280)={'tunl0\x00', &(0x7f0000002240)={'gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x29, 0x0, @multicast2, @empty}}}}) [ 359.557663][ T2038] block nbd1: Attempted send on invalid socket [ 359.564283][ T2038] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 359.595281][T12771] VFS: could not find a valid V7 on nbd1. 06:01:31 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff}) pidfd_getfd(r0, 0xffffffffffffffff, 0x0) 06:01:31 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@sg0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) 06:01:32 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:01:32 executing program 1: r0 = syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) name_to_handle_at(r0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=@xfs={0x18, 0x81, {0x1, 0x7, 0x6, 0xa7f}}, &(0x7f0000000100), 0x0) 06:01:32 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) kcmp(r3, r1, 0x2, r2, r2) 06:01:32 executing program 4: r0 = openat$drirender128(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$DRM_IOCTL_GEM_CLOSE(r0, 0x40086409, &(0x7f0000000080)) [ 360.577876][T12799] IPVS: ftp: loaded support on port[0] = 21 06:01:32 executing program 5: socketpair(0x27, 0x0, 0x0, &(0x7f0000000480)) [ 360.848657][ T1988] blk_update_request: I/O error, dev loop1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 06:01:32 executing program 0: r0 = syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) readlinkat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)=""/140, 0x8c) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000180)=0x0) fstat(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r4) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r6) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in=@broadcast, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe4) r9 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r10) r11 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r12) setxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB="02000000010004000000000002000100", @ANYRES32=r1, @ANYBLOB="02000600", @ANYRES32=r2, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="02000400", @ANYRES32=r6, @ANYBLOB="2220e4d7", @ANYRES32=r7, @ANYBLOB="02000400", @ANYRES32, @ANYBLOB="02000000", @ANYRES32=r8, @ANYBLOB="02000400", @ANYBLOB="1e303d49939142b0e797021c5e42ca1a0f584aaa6275561dd82fc721cbce6067ac614c77c83aec168ace3391fa2262ecd89f88236c3922ccaeb338645c2ba1f47692b538e5bc36863528a208859865d330eb270b72ef0fb3c3ab94547b60a5325fcaaae953b671315682ef46ab2c83431ba25ee12c5d31fcf8bbdb7f825820014c9eb8e61d14159f0eb452d0b71d4c0daa6f623ca631ffb6151d8cb60bfc3dc04fc442b527ae93503efb", @ANYBLOB="02000600", @ANYRES32=r12, @ANYBLOB="040003000000000008000100", @ANYRES32=0xee01, @ANYBLOB="10000400000000002000010000000000"], 0x74, 0x2) [ 360.915962][T12804] VFS: could not find a valid V7 on loop1. [ 361.081254][T12807] IPVS: ftp: loaded support on port[0] = 21 06:01:33 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) [ 361.947371][ T1988] block nbd0: Attempted send on invalid socket [ 361.953843][ T1988] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 361.995758][T12857] VFS: could not find a valid V7 on nbd0. 06:01:34 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, 0x0, 0x0) [ 362.097534][ T1988] block nbd0: Attempted send on invalid socket [ 362.104023][ T1988] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 362.131851][T12857] VFS: could not find a valid V7 on nbd0. 06:01:34 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000000), r1) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r3, &(0x7f0000000200)={0x0, 0x500, &(0x7f0000000080)={&(0x7f00000000c0)={0x4c, r2, 0x201, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @initdev={0xac, 0x1e, 0x0, 0x0}}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'bond0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x7, @ipv4={'\x00', '\xff\xff', @empty}}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @private}]}, 0xc0}, 0x1, 0x40030f}, 0x0) sendmsg$NLBL_UNLABEL_C_LIST(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100c000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0xe0, r2, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_SECCTX={0x24, 0x7, 'system_u:object_r:ssh_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @rand_addr=0x64010100}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0xe}}, @NLBL_UNLABEL_A_SECCTX={0x31, 0x7, 'system_u:object_r:systemd_tmpfiles_exec_t:s0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x2a, 0x7, 'system_u:object_r:dmidecode_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'nr0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth0_to_bond\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @loopback}]}, 0xe0}, 0x1, 0x0, 0x0, 0x20044004}, 0x810) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='pvfs2\x00', 0x8000, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 06:01:34 executing program 5: openat$bsg(0xffffff9c, &(0x7f0000000080), 0x90000, 0x0) [ 362.509566][T12864] IPVS: ftp: loaded support on port[0] = 21 06:01:34 executing program 0: sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000940)={&(0x7f0000000240)={0x6dc, 0x0, 0x300, 0x70bd2d, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_TX_RATES={0xa4, 0x5a, 0x0, 0x1, [@NL80211_BAND_2GHZ={0x50, 0x0, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0x19, 0x1, [0x69, 0x12, 0x1b, 0x48, 0xb, 0x16, 0x12, 0x12, 0x1b, 0xcfc72de9cbade640, 0xb, 0x6, 0x48, 0x16, 0x24, 0x6c, 0x18, 0x5, 0x48, 0x9, 0x16]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x9, 0x48aa, 0x8, 0x100, 0x20, 0x3ffc, 0x6, 0x400]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x22f4, 0x40, 0x1, 0x1ff, 0x2, 0x8df4, 0x1f, 0x7ff]}}]}, @NL80211_BAND_2GHZ={0x50, 0x0, 0x0, 0x1, [@NL80211_TXRATE_HT={0x12, 0x2, [{0x1, 0x5}, {0x1, 0x4}, {0x0, 0xa}, {0x1, 0x3}, {0x1, 0x3}, {0x1, 0x3}, {0x2, 0x2}, {0x4, 0x5}, {0x1, 0x3}, {0x7, 0x6}, {0x3, 0x1}, {0x6, 0x1}, {0x3, 0x2}, {0x6, 0x5}]}, @NL80211_TXRATE_LEGACY={0x1b, 0x1, [0x5, 0x12, 0xb, 0x1, 0xc, 0x3, 0x1, 0xb, 0x1b, 0x24, 0x9, 0xb, 0xb, 0x1, 0x30, 0x60, 0x48, 0x48, 0x6, 0xc, 0x16, 0x12, 0x36]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x7, 0x400, 0x1, 0x80, 0xf2b, 0x81, 0x0, 0x1]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x3}]}]}, @NL80211_ATTR_TX_RATES={0x9c, 0x5a, 0x0, 0x1, [@NL80211_BAND_6GHZ={0x98, 0x3, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x9, 0x1, [0x48, 0x2, 0x9, 0x1b, 0x36]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0x5, 0x1, [0x36]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x0, 0x8001, 0x0, 0x9, 0x3, 0x40, 0x2, 0x3f]}}, @NL80211_TXRATE_HT={0x40, 0x2, [{0x4, 0x6}, {0x6, 0x1}, {0x5, 0x4}, {0x6, 0x1}, {0x7, 0x7}, {0x0, 0xa}, {0x1, 0x4}, {0x7, 0x9}, {0x4, 0x2}, {0x1, 0x1}, {0x3, 0xa}, {0x1, 0x9}, {0x2, 0x9}, {0x3, 0x1}, {0x6, 0x3}, {0x1, 0x5}, {0x0, 0x5}, {0x5, 0x2}, {0x3, 0x3}, {0x2, 0x3}, {0x4, 0x8}, {0x2, 0x4}, {0x6}, {0x1, 0x1}, {0x0, 0x9}, {0x4, 0x5}, {0x2, 0x2}, {0x0, 0x7}, {0x3, 0x9}, {0x1}, {0x3, 0xa}, {0x4, 0x8}, {0x0, 0x4}, {0x4, 0x2}, {0x4, 0x3}, {0x4, 0x5}, {0x4, 0x6}, {0x2, 0x5}, {0x6, 0x8}, {0x4, 0x7}, {0x0, 0xa}, {0x5, 0x3}, {0x5, 0x1}, {0x7, 0x8}, {0x2}, {0x4, 0x5}, {0x1}, {0x3, 0x7}, {0x2}, {0x6, 0x7}, {0x2, 0xa}, {0x4, 0x3}, {0x2}, {0x7, 0x1}, {0x7, 0x5}, {0x4, 0x7}, {0x7, 0x1}, {0x3, 0x7}, {0x6}, {0x0, 0x8}]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x7a828948e4442c75}, @NL80211_TXRATE_LEGACY={0x1b, 0x1, [0x6c, 0x18, 0x5, 0x30, 0x60, 0x5, 0x1, 0x9, 0x48, 0x1b, 0x1, 0x1, 0xb, 0x24, 0x1b, 0x30, 0xc, 0x9, 0x6, 0x12, 0x6c, 0x18, 0x60]}]}]}, @NL80211_ATTR_TX_RATES={0x240, 0x5a, 0x0, 0x1, [@NL80211_BAND_2GHZ={0x5c, 0x0, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x87, 0x0, 0x4, 0x1, 0x3ff, 0x5a, 0x0, 0x20]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x7fff, 0x80, 0x9, 0x0, 0x1ff, 0xf7, 0x4, 0xfff]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x7ff, 0x3, 0x16, 0x9, 0x8000, 0x51c0, 0x1bc, 0x8000]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x3ff, 0x7f, 0x8, 0x8, 0x34, 0x3ff, 0x283, 0xca4d]}}]}, @NL80211_BAND_2GHZ={0x118, 0x0, 0x0, 0x1, [@NL80211_TXRATE_HT={0x2f, 0x2, [{0x1, 0x8}, {0x7, 0x4}, {0x0, 0x6}, {0x2, 0xa}, {0x1, 0x1}, {0x0, 0x5}, {0x5, 0x4}, {0x6, 0x8}, {0x4, 0x8}, {0x3, 0x3}, {0x1, 0x2}, {0x1, 0x5}, {0x1, 0x6}, {0x6, 0x4}, {0x5, 0x9}, {0x5, 0x9}, {0x1, 0x4}, {0x7}, {0x7, 0x9}, {0x4, 0x2}, {0x4}, {0x1, 0x8}, {0x1, 0x2}, {0x2, 0xa}, {0x3, 0x3}, {0x0, 0x7}, {0x1, 0x9}, {0x5, 0x9}, {0x1, 0xa}, {0x0, 0x5}, {0x1, 0x4}, {0x2, 0x4}, {0x6, 0xa}, {0x0, 0x4}, {0x4, 0x5}, {0x3, 0x2}, {0x4, 0x3}, {0x5, 0x1}, {0x7, 0x9}, {0x5}, {0x1}, {0x3}, {0x0, 0xa}]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_HT={0x28, 0x2, [{0x4, 0x5}, {0x7, 0x9}, {0x1}, {0x1, 0xa}, {0x3, 0x3}, {0x0, 0x8}, {0x2, 0x9}, {0x0, 0x8}, {0x1, 0x4}, {0x2, 0x6}, {0x1, 0x7}, {0x6, 0x3}, {0x2, 0x2}, {0x5, 0x7}, {0x7, 0x8}, {0x7, 0x6}, {0x2, 0x5}, {0x7, 0x3}, {0x0, 0x8}, {0x3, 0x6}, {0x7, 0x1}, {0x5, 0x1}, {0x1}, {0x7, 0x3}, {0x1, 0x5}, {0x0, 0x1}, {0x2}, {0x5, 0x5}, {0x3, 0x7}, {0x2, 0x3}, {0x1, 0xa}, {0x6, 0x6}, {0x2}, {0x1, 0x4}, {0x0, 0xa}, {0x6, 0x5}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x1, 0x0, 0x603, 0xff81, 0xbf50, 0xff, 0xff43, 0x3ff]}}, @NL80211_TXRATE_HT={0x37, 0x2, [{0x5, 0x4}, {0x0, 0x4}, {0x5}, {0x4, 0x1}, {0x5, 0xa}, {0x4, 0x9}, {0x1}, {0x1, 0x5}, {0x7, 0x8}, {0x7}, {0x1, 0x2}, {0x2, 0x1}, {0x1}, {0x2}, {0x5, 0x7}, {0x2, 0x7}, {0x4, 0x4}, {0x2}, {0x0, 0x3}, {0x3, 0x4}, {0x6, 0x6}, {0x1}, {0x5, 0xa}, {0x1, 0x5}, {0x6, 0x1}, {0x4, 0x8}, {0x5, 0x6}, {0x3, 0x3}, {0x2, 0x4}, {0x2, 0x4}, {0x1, 0x9}, {0x4, 0x9}, {}, {0x5, 0x8}, {0x6, 0x7}, {0x6, 0x6}, {0x7, 0x9}, {0x0, 0x9}, {0x4, 0x3}, {0x0, 0xa}, {0x0, 0x9}, {0x1, 0x5}, {0x6, 0x6}, {0x4, 0x6}, {0x1, 0x7}, {0x2, 0x2}, {0x6, 0x9}, {0x7, 0x8}, {0x0, 0xa}, {0x5, 0x7}, {0x3, 0x6}]}, @NL80211_TXRATE_HT={0x37, 0x2, [{0x7, 0x5}, {0x7, 0x2}, {0x4, 0x9}, {0x1, 0x6}, {0x0, 0x4}, {0x1, 0x1}, {0x0, 0x8}, {0x3, 0x5}, {0x6, 0x1}, {0x0, 0x2}, {0x4, 0x8}, {0x6, 0x2}, {0x5, 0x7}, {0x6, 0x3}, {0x0, 0x3}, {0x5, 0x8}, {}, {0x6, 0x6}, {0x2, 0x6}, {0x6, 0x5}, {0x4}, {0x3, 0x8}, {0x5, 0x6}, {0x1, 0x2}, {0x6, 0x5}, {0x5, 0x8}, {0x3, 0x4}, {0x6, 0x4}, {0x3, 0x4}, {0x1, 0x6}, {0x2, 0x7}, {0x3, 0x8}, {0x3, 0x8}, {0x6, 0xa}, {0x2, 0x9}, {0x6, 0x5}, {0x1, 0x3}, {0x5, 0x1}, {}, {0x1, 0x4}, {0x1, 0x2}, {0x7, 0x6}, {0x0, 0x9}, {0x5, 0x3}, {0x3, 0x3}, {0x1, 0x6}, {0x0, 0x6}, {0x7, 0x3}, {0x0, 0x2}, {}, {0x4, 0x4}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x400, 0x80, 0x430, 0x3, 0x0, 0x0, 0x7, 0x20]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x5, 0x0, 0x80, 0x2, 0x9, 0x7, 0x4, 0x9]}}]}, @NL80211_BAND_5GHZ={0x48, 0x1, 0x0, 0x1, [@NL80211_TXRATE_HT={0x43, 0x2, [{0x3, 0x6}, {0x7, 0x4}, {0x4, 0x7}, {0x7, 0xa}, {0x7, 0x8}, {0x0, 0x4}, {0x2, 0x2}, {0x7, 0x7}, {0x6, 0x5}, {0x2, 0x7}, {0x7, 0x9}, {0x7, 0x1}, {0x4, 0x7}, {0x0, 0x3}, {0x3, 0x6}, {0x3, 0x6}, {0x6}, {0x1, 0x9}, {0x7, 0xa}, {0x7, 0x1}, {0x1, 0x8}, {0x4, 0x3}, {0x0, 0x9}, {0x1, 0x9}, {0x1, 0x8}, {0x3, 0x8}, {0x6, 0x7}, {0x7, 0x5}, {0x7, 0xa}, {0x6, 0xa}, {0x2, 0x1}, {0x2, 0x5}, {0x1, 0xa}, {0x6, 0x9}, {0x1, 0x6}, {0x2, 0x3}, {0x4, 0x4}, {0x3, 0x2}, {0x2, 0x2}, {0x6, 0x4}, {0x0, 0x6}, {0x1, 0x4}, {0x7}, {0x7, 0x4}, {0x3, 0xa}, {0x2, 0xa}, {0x5}, {0x2, 0x7}, {0x7, 0x6}, {0x7, 0xa}, {0x2, 0xa}, {0x4, 0x4}, {0x6, 0x3}, {0x5, 0x9}, {0x7}, {0x7, 0x4}, {0x1, 0x3}, {0x4, 0x1}, {0x3, 0x6}, {0x5, 0xa}, {0x7, 0x5}, {0x7, 0x8}, {0x0, 0x5}]}]}, @NL80211_BAND_60GHZ={0x80, 0x2, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x101, 0x7, 0xfffa, 0x57, 0x3, 0x9, 0x81, 0x9]}}, @NL80211_TXRATE_LEGACY={0x14, 0x1, [0x6c, 0x48, 0xb, 0x6c, 0x4b2503a560589e4f, 0x0, 0x2, 0x36, 0x6, 0x48, 0x48, 0x36, 0x60, 0x30, 0x16, 0x36]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_HT={0x38, 0x2, [{0x6, 0x9}, {0x6, 0x9}, {0x2, 0x9}, {0x1}, {0x5, 0x3}, {0x1, 0x2}, {0x5, 0x2}, {0x0, 0x6}, {0x1}, {0x6, 0xa}, {0x7, 0xa}, {0x1}, {0x0, 0x6}, {0x1, 0x4}, {0x3, 0xa}, {0x3, 0x3}, {0x6, 0x7}, {0x0, 0x5}, {0x0, 0x5}, {0x0, 0x6}, {0x3, 0x5}, {0x0, 0xa}, {0x7, 0x6}, {0x0, 0x3}, {0x7, 0x8}, {0x0, 0x5}, {0x2, 0x5}, {0x5, 0x2}, {0x7, 0x1}, {0x0, 0xa}, {0x6, 0x3}, {0x7, 0x2}, {0x4, 0x6}, {0x5}, {0x7, 0x1}, {0x0, 0x3}, {0x0, 0x2}, {0x5, 0x4}, {0x2, 0x9}, {0x5, 0x8}, {0x0, 0x1}, {0x6, 0xa}, {0x1, 0x6}, {0x3, 0x2}, {0x4, 0x7}, {0x1, 0x5}, {0x2, 0x5}, {0x6, 0x8}, {0x5, 0x5}, {0x0, 0x4}, {0x3}, {0x4, 0x2}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x12f4, 0x100, 0x9, 0xc4, 0x5, 0x1ff, 0x9, 0x7]}}]}]}, @NL80211_ATTR_TX_RATES={0x348, 0x5a, 0x0, 0x1, [@NL80211_BAND_2GHZ={0x50, 0x0, 0x0, 0x1, [@NL80211_TXRATE_HT={0x4b, 0x2, [{0x5, 0x9}, {0x1, 0x8}, {0x0, 0x2}, {0x0, 0xa}, {0x5, 0x6}, {0x6, 0x1}, {0x7, 0x1}, {0x7, 0x2}, {0x6, 0x9}, {0x5, 0x5}, {0x1, 0x9}, {0x5, 0x7}, {0x4, 0x6}, {0x2, 0x2}, {0x5, 0x5}, {0x1, 0x7}, {0x4, 0x1}, {0x0, 0x4}, {0x0, 0x5}, {0x0, 0x7}, {0x0, 0x6}, {0x7, 0x5}, {0x3, 0x2}, {0x0, 0x1}, {0x4, 0x5}, {0x1}, {0x2, 0x3}, {0x1, 0x4}, {0x3, 0x8}, {0x6, 0x7}, {0x1, 0x1}, {0x6, 0x9}, {0x5, 0x5}, {0x1, 0x9}, {}, {0x0, 0x1}, {0x0, 0x4}, {0x0, 0x2}, {0x1, 0x7}, {0x5, 0xa}, {0x0, 0x9}, {0x5, 0x6}, {0x2, 0x9}, {0x6, 0x6}, {0x3, 0x3}, {0x6, 0x6}, {0x4, 0x8}, {0x0, 0xa}, {0x2, 0x1}, {0x4, 0x7}, {0x0, 0x5}, {0x1, 0x3}, {0x6, 0x1}, {0x6, 0x2}, {0x5, 0x2}, {0x7, 0x3}, {0x7, 0x7}, {0x4, 0x4}, {0x2, 0x1}, {0x4, 0x2}, {0x3, 0x6}, {0x3, 0x1}, {0x0, 0x6}, {0x4, 0x8}, {0x7, 0x4}, {0x7}, {0x1, 0x5}, {0x1, 0x4}, {0x2, 0x8}, {0x2, 0x8}, {0x1, 0x2}]}]}, @NL80211_BAND_2GHZ={0x40, 0x0, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_GI={0x5, 0x4, 0x3}, @NL80211_TXRATE_LEGACY={0x6, 0x1, [0x5, 0x1b]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_LEGACY={0x1b, 0x1, [0x48, 0x4, 0x3, 0x6, 0x1, 0x3f, 0x9, 0x3, 0x12, 0x30, 0x48, 0xc, 0x60, 0x24, 0x24, 0x6, 0x16, 0x5, 0x12, 0x1, 0x18, 0xa, 0x18]}]}, @NL80211_BAND_6GHZ={0x64, 0x3, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x8000, 0xb473, 0x42, 0x40, 0x7, 0x0, 0x394, 0x8]}}, @NL80211_TXRATE_LEGACY={0xf, 0x1, [0x4, 0x4, 0x1, 0x12, 0x48, 0x5, 0x1, 0x3, 0x2, 0x48, 0x0]}, @NL80211_TXRATE_LEGACY={0x15, 0x1, [0x1b, 0x30, 0x2, 0xc, 0x16, 0x60, 0xb, 0x33, 0x5, 0x3, 0x48, 0xc, 0x12, 0x48, 0x4, 0x6c, 0x12]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0xffff, 0x91, 0x8001, 0x400, 0x7, 0x8000, 0x3, 0x9]}}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}]}, @NL80211_BAND_2GHZ={0xf0, 0x0, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x22d, 0x5, 0xff, 0x9, 0x2, 0x6258, 0x54, 0x100]}}, @NL80211_TXRATE_HT={0xd, 0x2, [{0x0, 0x6}, {0x0, 0x6}, {0x7, 0x4}, {0x5, 0x3}, {0x6, 0x6}, {0x6, 0x5}, {0x7, 0x2}, {0x1, 0x9}, {0x0, 0x6}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x4, 0x5, 0x6, 0x1, 0x4, 0x6, 0x6e6, 0x1]}}, @NL80211_TXRATE_HT={0x51, 0x2, [{0x5, 0x5}, {0x0, 0x5}, {0x6, 0x6}, {0x4, 0x5}, {0x6, 0x2}, {0x6, 0x3}, {0x3, 0x9}, {0x2, 0x8}, {0x1, 0x8}, {0x3, 0x8}, {0x3, 0x2}, {0x0, 0xa}, {0x3, 0x3}, {0x4, 0x7}, {0x4, 0x2}, {0x0, 0x7}, {0x4, 0x6}, {0x6, 0x9}, {0x2, 0x6}, {}, {0x6, 0x4}, {0x4, 0xa}, {0x6, 0x1}, {0x6, 0x5}, {0x0, 0x9}, {0x6, 0x2}, {0x2, 0x9}, {0x4, 0x2}, {0x2, 0x1}, {0x0, 0x2}, {0x0, 0x4}, {0x4, 0x7}, {0x1, 0x2}, {0x0, 0x8}, {0x1, 0x7}, {0x1, 0x2}, {0x7, 0x2}, {0x2, 0x1}, {0x2, 0x9}, {0x5, 0x1}, {0x6}, {0x6, 0x1}, {0x1}, {0x0, 0x5}, {0x2, 0x7}, {0x1}, {0x2, 0x4}, {0x6, 0x6}, {0x4, 0x1}, {0x1, 0x7}, {0x3, 0x6}, {0x3, 0x2}, {0x6, 0x2}, {0x1, 0x4}, {0x1, 0x5}, {0x1, 0x3}, {0x4, 0xa}, {0x0, 0x1}, {0x1, 0x1}, {0x6, 0x5}, {0x2, 0x7}, {0x2, 0x8}, {0x6, 0xa}, {0x7}, {0x0, 0x7}, {0x3, 0xa}, {0x0, 0x2}, {0x5}, {0x4, 0x7}, {0x0, 0x2}, {0x4, 0x5}, {0x1, 0x5}, {0x0, 0x6}, {0x0, 0x6}, {0x1, 0x5}, {0x4, 0x8}, {0x7, 0x5}]}, @NL80211_TXRATE_LEGACY={0x1b, 0x1, [0xb, 0x12, 0x5, 0x1b, 0x32, 0x24, 0x2, 0x6, 0x48, 0x60, 0xb, 0x12, 0xb, 0x1b, 0x2, 0x1b, 0x24, 0x9, 0x24, 0x5, 0x1b, 0x3, 0x18]}, @NL80211_TXRATE_HT={0x41, 0x2, [{0x5, 0x3}, {0x1, 0x15}, {0x1}, {0x4, 0x9}, {0x1, 0x4}, {0x4, 0x5}, {0x6, 0x8}, {0x4, 0x6}, {0x6}, {0x2, 0xa}, {0x6, 0x2}, {0x0, 0x1}, {0x1, 0x1}, {0x5, 0x4}, {0x1, 0x6}, {0x0, 0x5}, {0x1, 0x9}, {0x5}, {0x2, 0x6}, {0x3, 0x2}, {0x2, 0x3}, {0x4, 0x8}, {0x4}, {0x6, 0x4}, {0x7, 0x8}, {}, {0x3, 0x4}, {0x7, 0x3}, {0x3, 0x7}, {0x5, 0x6}, {0x3, 0x5}, {0x4, 0x4}, {0x7, 0x7}, {0x0, 0x8}, {0x1, 0x6}, {0x1, 0x6}, {0x4, 0x4}, {0x7, 0x7}, {0x0, 0x7}, {0x6, 0x6}, {0x4, 0x1}, {0x5, 0xa}, {0x5, 0x3}, {0x0, 0x9}, {0x0, 0x5}, {0x0, 0x8}, {0x3, 0x2}, {0x1, 0x2}, {0x0, 0x2}, {0x1, 0x1}, {0x3}, {0x2, 0x4}, {0x0, 0x1}, {0x3, 0x4}, {0x5, 0x1}, {0x0, 0x1}, {0x1, 0x8}, {0x2, 0xa}, {0x5, 0x3}, {0x4, 0x6}, {0x7, 0x2}]}]}, @NL80211_BAND_5GHZ={0x6c, 0x1, 0x0, 0x1, [@NL80211_TXRATE_HT={0x2f, 0x2, [{0x0, 0x7}, {0x6, 0x5}, {0x1, 0x8}, {0x2, 0x8}, {0x3, 0x8}, {0x6, 0x3}, {0x2, 0x6}, {0x2}, {0x1, 0x1}, {0x4, 0x1}, {0x0, 0x7}, {0x6, 0x1}, {0x1, 0x9}, {0x3, 0x4}, {0x3, 0x1}, {0x6, 0x5}, {0x1, 0x2}, {0x0, 0x7}, {0x4, 0x4}, {0x2, 0x8}, {0x1, 0xa}, {0x2, 0x9}, {0x1, 0xa}, {0x1, 0x1}, {0x6, 0x5}, {0x7, 0x5}, {0x5, 0x5}, {0x1, 0x5}, {0x5, 0x9}, {0x0, 0xa}, {0x1, 0x6}, {0x0, 0x9}, {0x1, 0x8}, {0x0, 0x6}, {0x0, 0x7}, {0x0, 0x2}, {0x3, 0x9}, {0x4}, {0x4, 0x1}, {0x1, 0xa}, {0x3, 0xa}, {0x2, 0x9}, {0x3, 0x4}]}, @NL80211_TXRATE_LEGACY={0xe, 0x1, [0x30, 0x6, 0x24, 0xb, 0x36, 0x9, 0xc, 0x24, 0x60, 0x18]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x1, 0x9, 0x3, 0x7, 0x5, 0x6, 0x0, 0x8]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x3f, 0xdf5, 0x4, 0x9, 0x8, 0xceea, 0x9, 0x1]}}]}, @NL80211_BAND_2GHZ={0x4}, @NL80211_BAND_2GHZ={0xbc, 0x0, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x11, 0x1, [0x2a, 0x9, 0x1, 0x2, 0x48, 0x0, 0x9, 0x3, 0x24, 0x18, 0x1, 0x9, 0x5]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x8, 0xc495, 0xff, 0x7, 0x0, 0x8000, 0x0, 0x7]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x8, 0x1, 0x7, 0x7, 0x7, 0xf8e1, 0x6, 0x3]}}, @NL80211_TXRATE_LEGACY={0x1b, 0x1, [0x1b, 0x48, 0x60, 0x18, 0x12, 0x16, 0x6, 0x36, 0x1, 0x36, 0x9, 0x30, 0x6, 0x9, 0x6c, 0x9, 0x18, 0x3, 0x16, 0x12, 0xc, 0x1, 0x16]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x1000, 0x3, 0x1, 0x3, 0x6, 0xaee8, 0x4, 0xfffa]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x400, 0xc0, 0x9, 0x9, 0x6, 0xdeb, 0x20, 0x8]}}, @NL80211_TXRATE_HT={0x10, 0x2, [{0x1, 0x5}, {0x0, 0xa}, {0x4, 0x5}, {0x7, 0x4}, {0x2, 0x2}, {0x7, 0x7}, {0x0, 0x3}, {}, {0x5, 0x9}, {0x1, 0x3}, {0x1, 0x7}, {0x3, 0x5}]}, @NL80211_TXRATE_LEGACY={0x13, 0x1, [0x1a, 0x36, 0x4, 0x18, 0x5, 0x6, 0x36, 0x6, 0xb, 0x30, 0x2, 0x48, 0x3, 0x2, 0x48]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x8001, 0x2, 0x1, 0x4, 0x4474, 0x3, 0x1, 0x20]}}]}, @NL80211_BAND_5GHZ={0x34, 0x1, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x1000, 0xfff, 0x1ff, 0xfff9, 0x80, 0xfffb, 0x1, 0x6]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x5, 0x2, 0x4, 0x2, 0xffa0, 0x5, 0x100, 0x1000]}}]}]}]}, 0x6dc}, 0x1, 0x0, 0x0, 0x40}, 0x20040000) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) syz_mount_image$hpfs(&(0x7f00000009c0), &(0x7f0000000a00)='./file0\x00', 0x7, 0x4, &(0x7f0000001c00)=[{&(0x7f0000000a40)="e817375fa70fbbc22bfd52f74e8182c06face6059304863402150b794ec7016835cd2752efb472e80c69ac3a0c5221b004e3e5b519f47343d07e0cac317364a3562a664fa0be17b386555e250f7aad39c6df6e8d1777af3374afd471793697f6f5df3f999f4bd05221a4ed0634d2ea8cbae8808854fa4553f59d364c2c8e77e8cd6af60c", 0x84, 0x20}, {&(0x7f0000000b00)="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", 0x1000, 0x1ff}, {&(0x7f0000001b00)="be4994259b1adc13efc841ddb7f8231b8a2a8661c56f2b9d4f2f705058db197e4c8166cb24d313042aec4e4d238e9e68db533d8b9e6483973150df06ad0c7bee07ef44475f92904f863bc97bd6e0da29e26a150494778eaf539e", 0x5a, 0x7}, {&(0x7f0000001b80)="e6c242b9242c92c978d05e0639217a5ba2b75b72548e7c22fa8a70418423206e1c71a36643820d87bd784c38641159564f31c2ecfa0746939584b6e0ddc5651426bbbf044ed35e054aaabf65aa868a33970b726af0ba10715f3981f3f648e29b86c4e3474ab22999a880c120", 0x6c, 0x12}], 0x100002, &(0x7f0000001c40)={[{'\\'}, {}, {'&,\x00'}, {}, {')'}, {'&,\x00'}, {'v7\x00'}]}) mount(&(0x7f0000000040)=@filename='./file0/file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='coda\x00', 0x40000, &(0x7f0000000180)='&,\x00') 06:01:35 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) kcmp(r3, r1, 0x2, r2, r2) [ 363.149840][ T1988] block nbd0: Attempted send on invalid socket [ 363.156276][ T1988] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 363.214128][T12888] VFS: could not find a valid V7 on nbd0. [ 363.267527][T12894] loop0: detected capacity change from 0 to 8 06:01:35 executing program 4: epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000046c0)) [ 363.378792][T12865] orangefs_mount: mount request failed with -4 [ 363.380129][T12867] orangefs_mount: mount request failed with -4 [ 363.387613][ T1988] block nbd0: Attempted send on invalid socket [ 363.398314][ T1988] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 363.424321][T12894] VFS: could not find a valid V7 on nbd0. [ 363.500389][T12901] IPVS: ftp: loaded support on port[0] = 21 06:01:36 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000004480)=0x34b, 0x4) 06:01:36 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) getresuid(&(0x7f0000000100), &(0x7f0000000180)=0x0, &(0x7f0000000200)) r1 = geteuid() getgroups(0x3, &(0x7f0000000240)=[0xee01, 0xffffffffffffffff, 0xffffffffffffffff]) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {0x1, 0x5}, [{0x2, 0x1, r0}, {0x2, 0x1}, {0x2, 0x2, 0xffffffffffffffff}, {0x2, 0x0, r1}, {0x2, 0x1, 0xee01}, {0x2, 0x1}], {0x4, 0x1}, [{0x8, 0x7, 0xffffffffffffffff}, {0x8, 0x5, 0xee00}, {0x8, 0x4}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x4, r2}], {0x10, 0x2}, {0x20, 0x6}}, 0x7c, 0x3) 06:01:36 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) r0 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@private2, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000480)=0xe4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r4) r5 = geteuid() r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(r7, 0xee00, 0x0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000004c0)={{}, {0x1, 0x2}, [{0x2, 0x2}, {0x2, 0x1}, {0x2, 0x4, 0xee00}, {0x2, 0x4, r0}, {0x2, 0x1, r1}, {0x2, 0x4, r2}, {0x2, 0x4, 0xee00}, {0x2, 0x0, r4}, {0x2, 0x5, r5}], {0x4, 0x3}, [{0x8, 0x3, 0xee00}, {0x8, 0x6}, {0x8, 0x6}, {0x8, 0x0, 0xee00}, {0x8, 0x0, 0xee01}, {0x8, 0x4, r7}], {0x10, 0x3}, {0x20, 0xc7f0002ebc1948d4}}, 0x9c, 0x0) 06:01:36 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:01:36 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) kcmp(r3, r1, 0x2, r2, r2) [ 364.551735][ T1988] block nbd0: Attempted send on invalid socket [ 364.558252][ T1988] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 364.571718][T12933] VFS: could not find a valid V7 on nbd0. 06:01:36 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000000c0)={'ip_vti0\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x4, 0x0, @local}}}}) [ 364.620805][ T2038] block nbd0: Attempted send on invalid socket [ 364.620859][ T1988] block nbd1: Attempted send on invalid socket [ 364.620935][ T1988] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 364.627317][ T2038] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 364.637085][T12934] VFS: could not find a valid V7 on nbd1. [ 364.687758][T12933] VFS: could not find a valid V7 on nbd0. 06:01:37 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) dup3(r0, 0xffffffffffffffff, 0x0) [ 365.062061][T12942] IPVS: ftp: loaded support on port[0] = 21 06:01:37 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r0, 0x0, 0x10004, 0x0) write$binfmt_misc(r2, 0x0, 0x4) write(r2, &(0x7f0000000100)='\'', 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) [ 365.305430][T12943] IPVS: ftp: loaded support on port[0] = 21 06:01:37 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='/dev/sbd0\x00'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x818400, &(0x7f0000000200)=ANY=[@ANYBLOB="687567653d77697468696eecb0742986a2a6aa67653d616c776179732c6f626a5f747970653d7637002c66736d616769633d3078303030303030303030303030303830302c66736d616769633d3078303030303030303030303030333637352c657569643d", @ANYRESDEC, @ANYBLOB=',appraise_type=imasig,hash,appraise_type=imasig,\x00']) 06:01:37 executing program 4: r0 = socket$inet(0x2, 0x802, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8931, &(0x7f0000000040)) [ 365.917534][ T1988] block nbd0: Attempted send on invalid socket [ 365.924130][ T1988] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 365.943853][T12962] VFS: could not find a valid V7 on nbd0. [ 365.977898][ T2038] block nbd0: Attempted send on invalid socket [ 365.984341][ T2038] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 366.025662][T12984] VFS: could not find a valid V7 on nbd0. [ 366.175494][T12993] tmpfs: Bad value for 'huge' 06:01:38 executing program 5: r0 = syz_open_dev$vim2m(&(0x7f0000000040), 0x0, 0x2) ioctl$vim2m_VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f0000000080)={0x20, 0x0, 0x0, @stepwise}) [ 366.203150][T12999] tmpfs: Bad value for 'huge' 06:01:38 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)=@v1={0x2, "2d9632b141309d13d0d26401fb76"}, 0xf, 0x0) 06:01:38 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:01:38 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="5ac11b8b7b616e1feadb"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r1) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x200002, &(0x7f0000000200)={[{@mode={'mode', 0x3d, 0x4}}, {@mode={'mode', 0x3d, 0x78f000}}], [{@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@appraise_type}, {@uid_gt={'uid>', r1}}]}) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) 06:01:38 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) kcmp(r3, r1, 0x2, r2, r2) 06:01:38 executing program 4: r0 = openat$cuse(0xffffff9c, &(0x7f0000000300), 0x2, 0x0) read$FUSE(r0, &(0x7f00000026c0)={0x2020}, 0x2020) 06:01:38 executing program 5: r0 = openat$drirender128(0xffffff9c, &(0x7f0000001200), 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, &(0x7f0000005500)={{}, 0x0, 0x0, @unused, @devid}) [ 367.006151][ T1988] block nbd0: Attempted send on invalid socket [ 367.012707][ T1988] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 367.050263][T13007] VFS: could not find a valid V7 on nbd0. [ 367.249636][T13014] IPVS: ftp: loaded support on port[0] = 21 [ 367.324741][T13015] IPVS: ftp: loaded support on port[0] = 21 06:01:39 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f6465762f6e62643000958c9837735ed6c878c372ccf2f16bc2a184068c1e186437d53fec2fa21c7301ff0ef73efe213b7468acbbe416256daa794d97dc"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) 06:01:39 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="2f31b0720000ba47a8062ca98f42508fe2a7ba5880c84cd600"], &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='squashfs\x00', 0x1088804, 0x0) [ 368.203081][ T1988] block nbd0: Attempted send on invalid socket [ 368.209530][ T1988] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 368.228331][T13067] VFS: could not find a valid V7 on nbd0. 06:01:40 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) kcmp(r3, r1, 0x2, r2, r2) 06:01:40 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x8, 0x0) mount(&(0x7f0000000200)=ANY=[@ANYBLOB="85d580c1060f29bec0fe80430dc4568c84203319120c610d3ae2cdfa40b704bd1c8ec045ac03825e702ad795a0bfac5f31929e39ce6c6497acf878af7286ee65adce3af582dc73cd655b4e437f7a3f214fbcf001938924778180be827a745c4016c31992a540145e17cb07bd996845d65aea45d6df056b17a799cd6b187d1a27641658dc6ac2468b03de04351d7134a326896b6d7dbe225accf70a16dd83d659b453d4eaa4de7991a4a826b10e4dc32718cdfe9a071fb53a3877e34042cd9af561ddb12c5882fb509246"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x11) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r1) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), 0x10, &(0x7f0000000380)={[{@redirect_dir={'redirect_dir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}], [{@fsuuid={'fsuuid', 0x3d, {[0x32, 0x33, 0x63, 0x32, 0x30, 0x38, 0x34, 0x36], 0x2d, [0x3, 0x36, 0x63, 0x65], 0x2d, [0x64, 0x63, 0x64, 0x64], 0x2d, [0x34, 0x38, 0x37, 0x66], 0x2d, [0x65, 0x36, 0x64, 0x62, 0x61, 0x30, 0x30, 0x30]}}}]}) 06:01:40 executing program 5: r0 = openat$bsg(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0, 0x0) 06:01:40 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:01:40 executing program 4: r0 = socket$can_j1939(0x1d, 0x2, 0x7) sendmmsg$inet(r0, 0x0, 0x0, 0x0) [ 368.574549][ T8893] Bluetooth: hci2: command 0x0406 tx timeout 06:01:40 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000001a40)='./file0\x00', &(0x7f0000001a80)=""/223) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) r0 = syz_mount_image$gfs2(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x8, &(0x7f0000001640)=[{&(0x7f0000000200)="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", 0xfc, 0x10000}, {&(0x7f0000000300)="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", 0xfb, 0x2}, {&(0x7f0000000100)="5928344ef0e4767a6c97bc15c945406862515e902a1ce5c64dfe089160cf60924117d9a28fa6f9b59c2985d2ef437d6aef", 0x31, 0x2}, {&(0x7f0000000400)="72058410be7e442c59f34307a715790739d7a56e93756c1fb8d3381f219d63e64a4aeeb09185aabc5c2847ecefd2e4f3ad48fbcfbcb81b5832471403dc20950482a45d8ae0e646528925cea4c9c1f3d085e97506922b8850f096ddad286b1a9c02925918642722fe4d5b3b52eaaf3871d5a23a3272df4ffc13ce23752101bf2db4f037dec5152ea871234c56f48301725397c70cb677d5fa9b869db01b475b288abd3876ecc9ca3f1bcb5bcb44c55fcc0ac69ac378561563d9c2a1814a17729522300b6615395ac89e13fd00a867472a035b197375525705f0b83051517269ff98d65fa615298fca", 0xe8, 0x40}, {&(0x7f0000000500)="c39513963b14abc409ba38115f7fb7f87fc55f88cffc5972a4919e9c2fa7e5db906f77cbef263e32cb5ce92eb2d6c1b080eb036a98c1bb070d393e8e8cea8a815b1f1863afc384ee447046df77c57e352fa85ca53ddf0c8ea34ae8201b1e386acd016adf04b54bfaa96852fb779f639fc85d750ad0d41728ffe2b1911159a0c8ba8399f5e66010223d38ee3e336cd69be9cb881447dc79a45f0885706794e0f70b7bcf86bbd28a5c29ed19a349bbe5019edaf0e134391318ec9807d35dc3d41299f44920594e7159ce34245735ebecb6424d194be0929392fbbb3a7b950d6738b9d59e3fc8144b2c68e657677ae3d57269ec82a3a8cfd59e51f6ce2ea7c6dd965e561e10c4168be1a2c4960693301b504291dd42fda31ee4e71dac8969ed06a6db73e9b88139f7eb302f9e71f0d50e75cebab6f9bd207f6666194dcea42c43586c96b448ab01240c659d635a745338898aec80e8c341049cc7e600ecd92c61a8bb0297a022a8cf7557f840f10404913deedebfe923310f3f3eb00f68747ed83a4536f0ea77ef8dea601e044ff5f7a3eab76b141e9fa3bc39692927c12226191e97b88740309f0fc1b963e4a6066b178554955bb5cd0e5cb02acdb6db961a40cf76a56d1c69852aa9f69ac172edfac6666bb2587143579ccd95211ed490a6c08ff175c0f99adca561b570dc3c3ac2c1586f989bb46d71856e78bfdada68ed366c3976a3f979a26a5b3b01111689cf519acfd442e7da0431573c6e085b65603ae2ea06093457617ce0856868c4fcfe1037b2418823134ad80ae930d806b81ad9698f42300851c2113896b86bbf38a4c51ab813abded8757e7c292ec8756e822afb1f9e82bbfc6f050e5600f75f6c9024e16e1a8a669d7c1a7306f5957099e9df21ad66aaaf0f6263db9c27dec23e362e592648a189ac32f79a239fad903a8079fe0acfcec3e1249100a9b0099f86a15c49c7f45ec5203c2eb20ba284ffc53ed5e587bf75606b180805187dc82d7af9b9082cecaf3df080ad298ca82cd2cb8dc280e904a73fd15479d905835f51406642a95a7a8a07d5148105693be144d11bb9ccd33f1f5687f8cdae5c926224964eeed5462a57d7338cbb57f442d46ed95de2ea8f19f59c364c5d008b61c53e4752167d300451eac6ebf3789cc0e4fdd26437c90d508151375e7641f1409853e98e8c435611e5d8d72661622e65e61286153b2370d62370f463572041bf345ca58ad36c8dfce0805f1a53ed2c038a604c7237005458d20ba095674ba3a5678546a75eaedb636067cf8fc9caf5e9f583ee828f9befdb904c8ad13e5d3787fa21e3720903eb8ab89105e6c059e7a99ce2cbe749174b5e95816eefb185ab4c938803567cc4c347a899927b5747b627e53dac5334ff3f1dd6262d7d6b0e4890f722ca6f7879ecfe2347e28e8de3022d4581785a85d962e2babaa6e5d53a684ee2e7afe8a10e622ff5ec64e3a8f87c126df93fd61e657ab446c05c5d36b1f2b5b4c2689fc44d9de88a38f4d219f321aa3556e508e208f2f0fdecc66b4da9e879fc1fc093bca662a804efc3bdcdee01cc1a014020fac6b9fa0b5e7a42829c633f7b6fe2d7af0af7b3bdfe7425bb938e4a1b9abce06cbd73973038e2dcfbd95695c7865f5caae941dd7be55579a0507c7cac1fa02011eef00b6cb12ae1c7608260a82d28b49c47af9bb969c2084d688b00fc68a40e6e28a16d46b4000af5165ade090873f0c9b832d6c532fd8862b87b40bd2d71e377292a6df6b8fbf657f36e95e92473dbac5b47e1a6825824178fadf62131a2436e8349bac2056b748f37930ccccb22d4a44ccec0a8daf6d597e1dcec4da72685ce28ced79060056de8c1764540e8f2f8df4a5129f137410a87c2591e88804f2b20ae5244275c8d6eac1e7780fc76bd27b23d827cf7d3004771b6e5cabdce3b7a6090e681fe8ce7916b298164f1b14f2ff541f111d23feb359977df38ae54cdc4c23f23ec4ff44ad22546f5548863edd35d9cc2c481f723d55497993a9299ea9626b839c32eb344cbba919114cf96ad2d646800d6e443d88b43f5c568732f4363d70c1dd20badcd1a298e28c05da2f2777bfb2582eea6cf54f72219e43f557baaf01d1004e266c865d4055ee2c604d4d091538d8ad5c647c5c04cdd6419d8a602769b36d82e315497824f16a81705a4ac47590e014cc7ec2bce76e030ef98b36cecf0ab634116caa85a422e707450fda2499270767022dc5cb49fe85b82ec3b26f81e6828501fb4ad18d053504053f0c8a50cac758c0aeb1a52af4cbc0174d04201141f3d369eb8d682d904c7b26cb7dc88c2c0db6d636f908ae83cef5d30876d946ff538d22f9c21e78b2c93fa16f491126027ae2544c763c547f12aaa6e6bcfdb508cbfb14862717f3d11965a532da73d88603eb2f27011babb5dac1510b6a8f41d620c355e865a27a63540d85507f36ecfbfdbd080d388aeb8d8445b1a835f35ee9356bad082ca2d4db7e16b9fb2269432fa8cea37df68b550820a026724e5be825ff93bffa70f2543ad8692418c42492536f041f03aa1000d501310bc1313d5e9c754b64dd2e2422855ea3962897c241ec671953f9f2c61d683eb9de63375cc7300662e6c1933502334d27ff5c8e88140ff0eaba844cc3cc6c67582e3975e4beec76f7af77f7a51e6bb18872349748fd0d5c7182d7350b85ec6526ed8f18505569a503c72d05851002d7cd74f2966b8e698e76f133923e440aab5144a41153f65a44f0bb2b273823dc7eda067951e0c5ecc8493b290d4286508ce6495cd8e38230a5fca9a83dc3b3b1f4e5d653fabe9e52f344b20941fd106dfe395a51ac93291bc0fcf1b53f9cea30c61a748ede0fbf7b2144ddea6d762c7884a7b5635d9decef529402e0399fa476551a1b094884ebf58433d148aea05eaac20b5d5a4644f66f8429e0e0a633028ceadb503348e0efa6bb5fb85a1ca045c0d943fb40d79993523a8d75ea47332bfb84aef72b6c5c95afed52d7631da7f2d874dab25f83e83b8182d40ff40c61c536ede7a278fdeb85af0143767234df13216aab13a9035643a3317dee2d6ce93e6cf3aa36c7b3b1775cd0a7318cf84f73a5baf6913762185200fe80624c152f33891eb080512e622ecdb3059f7cd0422cef9c86171aa97332c9b03224c8812ad2d2cba3b1c725650f8ff78c23a2a0dc4772a7c7ee4d3d41bde1d0164e7427babfe9ad9fa8a372d295940e153967e1940bfcdb7cf1318c93188b7645db04f2514735de39da9fd73623e0ca81cb040be5557f37a61575889a6b0cb8ea2c36eb2913b2b8476bcc812340f42c9c37296b81b096c2ac73862697da15125867d50cf18bc3e7834f2dba1ac94c20de0b6c65ac4b4cabab11458754728543ad4d485561d2cb31a8f38684264baa95a1e7aa140d46c667f9b8e3a64c780aea7610a496675461c4f0d3ab7b4542bacc9567d0f37a416d26c21d7e248af17dcfb778c4b20a82c0cdba531fbf861852fba914bf0fd19baad14ce9f645ed5e95b5528d8721eeadee781ecabe5396709f4b330969c4071737f9b922da178adeb493bea92927c0ef2f402cca74b8cbbb4c58d149e0b27bb55b4af243b9f7692cea94c94050a005607ad6e1f65312527fd0c4b16ed84778a1d42c2796b3736976c9dd7429f8c7cfa75a650e0a103416fd5e516af36e340b9701ec02a9086fba4f01e11e4176b655c286b1473b5195e6130b69e032c55b296a106b9ce69ccb96fa1be023ce450c0a129066b6a459ca634a06c914e5fbf8b41ca4d69ef339db7a95dfd476929ded168a31a1c83cf1d495f3235a92c03d44dc282db5c041bb450ea77d38327fbf142f75c60c2ded89caba2aded0972a867cb4e2f79b8019e707fb07ab270bad1120d518898283c5d7d1cb8c6fe93bd4b266351008898bc7de14a749b20d29506652f2740ae22080e68b9ed7af5bc53ba1789b66aa15e1642c9d1acca9dccb1d5f0ff5f4d40bcb53722c2636dff0243610a2dcf50d00fdfc9fd6551c2002f979e0032a4b7d77ddfebc1882e96e460126cad51f425f12535b3751e1f8cd649fef1b18f3f544a184b61beb055e5d272a86330ac252adf3b278b7e4ae71894134f52526a26f484a463ccdc2ef87c49dab27da3a61894a368c3c2cf4357002e0e55bd1251c66c4ec325b846d1c6eb26c1b900e2fadbd5cde154e6399aebb057bc277dd2ec0901fb0f4fdfbd61e5ac84b43aed55b5f6c21712d6364de3d4f6e8c2def8ff84f7024908f06ae0d53a59d4d1ea5b12e679b70733b776c2459c676d5f9d06b29baa6e5096d3733135752164774fa43e0946f9accff9ea5617d1ca766d499fdabfb6c3454790113a2a56dc842e18a2d30ab90d610f5b1995f8acbfc328dbb57ff40bb6d1bdbac503656e457631c633df71a623536aab80636e7377d2cff3a4e9bb43e928becd813f30d2e51aebe709186de5f3046e54ead8507ffe326678b36487b4d298fea059b0a648f464aa01d4cadd8768b7fd0f9a02749b95548c7a3ff99d1bbee58409c6043e183c16dd4539fdccc2e52c7954abb4ebc2e5fd0bd825663e2246e940976e449acaa14f5be97c30698e10baca791b982d02a4afc1988baef7defd2e815873dc8284408836219e83404e456b393c8d21893237a13dfbc82d7a8a93d38b03d4c02177d2119a637253741e86cb55b188c41cac49a48b7340e63566a7bc8ba79695f8c5bed4e816b06a29ef307b47e60191eba4094c3f002aaf249252359d6dd9364ebfaa5280740219d1f5944f8d3a9b0f78008f180b382b6306b254465b78133a51e96934258a0b2e9f25e5473e009652ecfb6fb2cbc1d80878ba25afb9a577ad3bbe7f0175c782e033d785e278c89ebe02694924fb4801066e955ee696e9d022310a7ff666f92891eec20ce31b387fe424cbef8614cff6c83d210cfd77db125c09d09457a56e08d28b69028111cc16b92cb35fb59eae3be6565d12b41d96564991aa4c7e613e3b31c68c8265f14427b73382b24edef334ef4aac9d0991f2835ee87459f95b3ddec30850577528713c6fabd1cf8f3918355e5d7519961a346fe9a9c830fddf79c9f6ddf87eb993c1f57a69efad80b2e01535622b39396bb1c6d6cb4579da379a121129dc9a86ed142f1fd3b62d09f086269dc33f462a23016cd08599640668b07635a9005f243f45cf2b0b1c5fd67ec465cbe4626b2dd8503bc1a8c9809dca6e94e2c2851c350bd33b6f59fa81a7dd2b4777ebe9a8429c3ecb032d48df7bea2e2873ac91e8c891174c3f95a8dc4fe90be2e3d4d7ebcab09c77b0b709e5da6e1ee764ae30257b5162b363db0702fbd058d28f865e0101226a7dbc01201709b77278196dbf150fc3b899cae427ffd9f9a138d94c8471066fb84865cf7099909417f101b12fd9175e3da66e21cd7264d180a31de54f39980c97b6d63a4d202b78b5489eed6d30e40f36cd9cec4d77f1966a28c0d4db26ff11069e78feaa77e4a250645684a7977375f9d3500803e6b7d6ffc88d9bbdb02589c1d45196a6c8c76c62da9bbc4a0a9bdcabc5897dce3df07aa997ac9c50bdeaccd5dbc8f0caf047ec2e2e8eba14ddb313d9e12666b115bf9ef41eb97514bbb9a2e5098a2f034d011bdf44196c7f39367d384e4304bc61ebb316922f2501d84341a5519e28ffdc02d9f43a8109ba1f29cb47ee64ab26bcb19b4727601fd4e0df21c90fef215a0878c3533806670b407acac1297f254b441252b978e6afcca6abf894dacad5641d65d22133269c59688c3eee9d6c30bff7", 0x1000, 0x8}, {&(0x7f0000001500)="2c51f27099b03fb52517d3da522f86e8d14b642250e2899903bfd9b49c9ffcff224e7b66805e4639ccd930d29bee4c5641184438bed2fab0f955d7d73fae0322b02865f958bbc561fc41f5b4c2d1ddf333d896c5318022663501dfa2c13711d6e025cf4b956e52aecc1d6a439f75a41a0950acc14f45b79e4ba228026490baf44d4964dab0ac6cdf8c4c5ab00547950f9aa8cdd204dd405c0d3d88427c0858b3aa5c37ea09d3dc69c3c99b2a4c3b2f8425188910d15dba88d55ac73fbf1e", 0xbe, 0x10000}, {&(0x7f0000000180)="2bc4861f302ae9e53b09ecb25c3869eaa201e5a30aca24ef104eddb995c556c804c62f417a2c2578979438c345", 0x2d, 0x5}, {&(0x7f00000015c0)="b40508fe87231929b69e5476159966cd46ef8e5f48397eb4a6d474b742b1f670a66ad98e88eaf4b6e1df5103a1a2ba3151ce0a5e120fe507143165854512c57b68ace873be5cb0d08d9d8d4394408d6dc9d8f1dddc3a0e650c67798937c6cdc298d1a820178b406f4d9b6bcd4391aeb628", 0x71, 0x8}], 0x28420c8, &(0x7f00000016c0)={[{@localcaching}, {@quota_quantum={'quota_quantum', 0x3d, 0xef}}, {@nosuiddir}, {@quota}], [{@fsmagic={'fsmagic', 0x3d, 0x1000}}]}) execveat(r0, &(0x7f0000001740)='./file0\x00', &(0x7f0000001980)=[&(0x7f0000001780)='v7\x00', &(0x7f00000017c0)='\'&{[*\':\xd8.\x00', &(0x7f0000001800)='v7\x00', &(0x7f0000001840)=')]\x00', &(0x7f0000001880)='/dev/nbd', &(0x7f00000018c0)='#^\xe6#%-]@(&\',\x00', &(0x7f0000001900)='*&\x00', &(0x7f0000001940)='-\x00'], &(0x7f0000001a00)=[&(0x7f00000019c0)='-\xa7/\x00'], 0x400) [ 368.939848][T13074] IPVS: ftp: loaded support on port[0] = 21 [ 369.087112][T13077] IPVS: ftp: loaded support on port[0] = 21 [ 369.404229][T13089] overlayfs: unrecognized mount option "fsuuid=23c20846-6ce-dcdd-487f-e6dba000" or missing value 06:01:41 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) kcmp(r3, r1, 0x2, r2, r2) [ 369.606963][ T1988] block nbd0: Attempted send on invalid socket [ 369.613383][ T1988] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 369.648090][T13110] VFS: could not find a valid V7 on nbd0. [ 369.819456][T13109] loop0: detected capacity change from 0 to 256 06:01:41 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$SO_J1939_ERRQUEUE(r1, 0x6b, 0x4, &(0x7f0000000040)=0x1, 0x4) 06:01:41 executing program 4: pipe2(0x0, 0x100800) [ 369.883771][ T1988] block nbd0: Attempted send on invalid socket [ 369.890086][ T1988] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 369.914143][T13110] VFS: could not find a valid V7 on nbd0. [ 369.961079][T13121] loop0: detected capacity change from 0 to 256 06:01:42 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0, 0x408, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) 06:01:42 executing program 0: r0 = syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x48800, 0x20) [ 370.447034][ T1988] block nbd1: Attempted send on invalid socket [ 370.453530][ T1988] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 370.520305][T13146] IPVS: ftp: loaded support on port[0] = 21 [ 370.553085][T13147] VFS: could not find a valid V7 on nbd1. [ 370.646227][ T2038] block nbd1: Attempted send on invalid socket [ 370.652838][ T2038] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 370.664531][T13147] VFS: could not find a valid V7 on nbd1. 06:01:42 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCDELRT(r0, 0x8983, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @dev}, @rc={0x1f, @fixed}, @tipc}) 06:01:42 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) [ 371.138265][ T2038] block nbd0: Attempted send on invalid socket [ 371.144707][ T2038] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 371.195899][T13152] VFS: could not find a valid V7 on nbd0. 06:01:43 executing program 4: openat$vim2m(0xffffff9c, &(0x7f0000000400), 0x2, 0x0) 06:01:43 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000180)=0xc) r1 = syz_mount_image$bfs(&(0x7f0000000740), &(0x7f0000000780)='./file0/file0\x00', 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="bbddee2a8f52449d712863a081ad794b444a77b874f0476c4a8c0acfd28fee26d75d327f208b5c5f9b6a962e0fa2feb76dd5e7a828206b52100108c98d7a11d6573a7180d095158af52e1e62e973f71de9af7196cfca2f4da8e006a1e2bb4409745a5a53d7c371e011134443a018c1b146f209e6369d6b9c9b5dab5750274b05b6c60b9e074c856c52e9eaaaba371fbf6eee90805fe13c0b5f7a397f95a0f6a86a8018d5d1a5977f12098e201e727742b2b4eda2f5b54e1835abac48e68c9b7d5ead6b262d8c4f186eddd61ca5175d41fd7adb352a7522bbdbe53a9730f6ba55696140824b3381cea5a2bb3edcd7604e347448d7926ada", 0xf7, 0x6}], 0x10000, &(0x7f0000000900)={[{')&+-[.-'}, {',\\'}, {'huge=advise'}, {'.-{'}, {'v7\x00'}, {'v7\x00'}, {'%\xc9&+!}'}], [{@obj_type={'obj_type', 0x3d, 'seclabel'}}, {@fsmagic={'fsmagic', 0x3d, 0x1}}, {@context={'context', 0x3d, 'user_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@uid_lt={'uid<', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'system_u'}}, {@smackfsdef}]}) name_to_handle_at(r1, &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)=@ceph_nfs_snapfh={0x1c, 0x4e, {0x1, 0xffffffffffff0000, 0x6, 0xf2}}, &(0x7f0000000a40), 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0), &(0x7f0000000700), 0x2, 0x2) syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000300)='./file0\x00', 0x2, 0x4, &(0x7f0000000600)=[{&(0x7f0000000340)="feec8ecaa2c417f58777a9bb14567f38026532a867bb271a0e7f96c95dfdf7322dddf66cd3437d71ed9ce7810d57f92e4a47370a7e3fd171f087e00282bdd9939dfc2e84e4782909c532bdbd4810b4729bc01690b1de8d942a3a0d3f907a596f495106c7050624fdda76816fe5151cfac76abc195c189b797f92f0585d0fd7c7da0a8c045330525a387318d039c087ebb876b16320e4fead53908331a6a12539e49e226c64b177c244c1fcd081502cdf93e5010cdc62079512c56b4bc5bfd19c0025143bd0cfce6e27d8b2530752f3e74a", 0xd1, 0x2}, {&(0x7f0000000440)="b522a6fa0b16090956f16f60e7bf90913cc2158effc498ad893a9ae692248cf301edd0350b74f8be31937fbb241cb8bc94049b43579ae12b88f69090a937fcd716d4ee2bd96d2c4688738e59a6fb816193afc4f85be42458c56fb52062351cf7f43241c15f82ffa9b4539e5b99e55b4a84d6473c26cb380f30a4941ce7104ab289ab7bf71574b481966d78a7b1e872b32b302740f08aada16a009b4247d8bdf9b76ea31da4f4f4844862a9798813a4a8", 0xb0, 0x7f}, {&(0x7f0000000500)="d7e5e8395bef1ab2d2afaa287c8fce3bb3eb929acf75469f39bacaf0086f22e97f6643680cf45b0d7f41c24038b7b6cf430382ce1caf7db1a55a5efe20ce1d9467ffdfaeae911a62409c", 0x4a, 0x564c}, {&(0x7f0000000580)="0f58f0c577488a38b130a7c2e8f669435d20be7388232d7bc0f1c16503ae0baf31daad76ec87216de611882fcccb8f3c2f7774f7fd63d3245356f6b8b1f36639f5979025b458e4872a6d72db239feaa843d28b68a8a6e76a4b970bb1edee7c9b1f30a142363dbb2e70623692f318f2efb4", 0x71, 0x3}], 0x50080, &(0x7f0000000640)={[{@huge_advise}], [{@audit}, {@appraise}]}) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x85000, &(0x7f0000000200)={[{@uid={'uid', 0x3d, 0xee01}}], [{@appraise}, {@smackfsdef}, {@uid_eq={'uid', 0x3d, r0}}, {@seclabel}, {@smackfsroot={'smackfsroot', 0x3d, '+\xf9,'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'system_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}) [ 371.267464][ T2038] block nbd0: Attempted send on invalid socket [ 371.273873][ T2038] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 371.287868][T13152] VFS: could not find a valid V7 on nbd0. [ 371.501938][T13168] IPVS: ftp: loaded support on port[0] = 21 06:01:43 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x10005, 0x0, 0x0, 0xe0008, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) [ 371.863127][ T1988] block nbd1: Attempted send on invalid socket [ 371.869441][ T1988] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 371.905241][T13190] VFS: could not find a valid V7 on nbd1. 06:01:44 executing program 5: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x14, r0, 0x1}, 0x14}}, 0x0) [ 372.016432][T13197] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) 06:01:44 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) kcmp(r3, r1, 0x2, r2, r2) [ 372.247158][ T1988] block nbd1: Attempted send on invalid socket [ 372.256643][ T1988] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 372.285028][T13190] VFS: could not find a valid V7 on nbd1. [ 372.326743][T13197] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) [ 372.446785][ T1988] block nbd0: Attempted send on invalid socket [ 372.453238][ T1988] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 372.491621][T13216] VFS: could not find a valid V7 on nbd0. 06:01:44 executing program 1: r0 = syz_mount_image$hfsplus(0x0, &(0x7f0000000040)='./file0\x00', 0x1, 0x0, 0x0, 0x1914044, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) linkat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000180)='./file0\x00', 0x1400) 06:01:44 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:01:44 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8921, &(0x7f0000001840)={'gre0\x00', 0x0}) 06:01:45 executing program 5: r0 = openat$vsock(0xffffff9c, &(0x7f0000000e40), 0x0, 0x0) read$char_raw(r0, 0x0, 0x0) [ 373.083991][T13221] IPVS: ftp: loaded support on port[0] = 21 06:01:45 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="2e2f66696c65301aac958b0094381ecce99b224602b90a041c619aee0f32891ed39d6bc5346e37c48011a87b03953c1bb33dab9060734df7c4ee86876e810b8dd58108994ed4904413808580af9949c37dd69a27c479752d5f41f17cea4f847eb71edbb632d6f28ba3910fd9d74d68"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r1) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(r3, 0xee00, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x8020, &(0x7f0000000200)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@blksize={'blksize', 0x3d, 0x1900}}], [{@pcr={'pcr', 0x3d, 0x29}}]}}) [ 373.356869][T13226] IPVS: ftp: loaded support on port[0] = 21 [ 373.433422][ T1988] block nbd1: Attempted send on invalid socket [ 373.439793][ T1988] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 373.461256][T13228] VFS: could not find a valid V7 on nbd1. [ 373.496583][ T1988] block nbd1: Attempted send on invalid socket [ 373.503205][ T1988] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 373.526166][T13228] VFS: could not find a valid V7 on nbd1. 06:01:45 executing program 4: socketpair(0x0, 0x8000b, 0x0, &(0x7f0000000000)) 06:01:45 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x10, 0x48}, [@ldst={0x5, 0x2}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)=@md5={0x1, "2c2721313f0aaefa50f0bf3df7d442d1"}, 0x11, 0x1) 06:01:46 executing program 0: r0 = syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="92d30cb12f6400000000"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x3, 0x6, &(0x7f0000000640)=[{&(0x7f00000002c0)="17287bcb23dda7ffb5bc1a652c59e7af25b9af5901d29fa98bf140dc21086595e4226327", 0x24}, {&(0x7f0000000400)="e3e315c8c472966c035065133ce23dced4f499b18bda5dd15960c6fe782093a7e65d931db56fcec71b19a42134b6b05622b93f0aa68727d999a246c9cca7be231682560105c2cd283eb401672bfa1f94e85ff7864392f510d89ae19b23c65e79fdb50c53ea749f1537295649837985f6492a7cf681cdf205", 0x78}, {&(0x7f0000000480)="0c33b2ed4f9e1935e00e7638fec2bf6552105ed25637b49d8120a7528d03bc88f830a76f367ee74d3f6b2f02368c51c4659b76d4fa21b1f8e6a800073e3f6178f3bbe9ff9e02f8e55382154f0f1eef1798066b14846b4ebe7e08a018e62f8fccac7b8c56ad5e7209524e4ee8b2d905a4a09da65195c9bc4c5b3524394334f899908854351d201bcf02722e75bca0ce54855f2118580d81d5aefba6cdcf9b86d3aa80470fe82b005b", 0xa8, 0x5}, {&(0x7f0000000540)="3af9b106df629a47dacc636bf2b8588c0080884e96465f734574ff43d7bde3cad06cdd0a8dc42165969d2790635b01c0560b8896e5ba9940cbd59390f29c7d109e0a9de392fb4ca21a06b1a6b13e3dcab52ecdb81c85b21c6646b429250e", 0x5e, 0x8}, {&(0x7f00000005c0)="65d8662f1c8d73f6dca0922e539e314759caf6ab6fb7106c0d2688323b1ae7daee38c9a828f50df5ee1d3254a3fb0caa2db60eca8a88526770e239b681cb", 0x3e, 0x300}, {&(0x7f0000000600)="331d1e9c1f199ef2c0999829894f16901c94e940741eef9522c49df6afe0e50b5c4fd2e0f7d66b82fc55260d812f59e582a989", 0x33, 0x7}], 0x100000, &(0x7f00000006c0)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x39a}}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x101}}, {@noacl}], [{@dont_measure}, {@seclabel}]}) mkdir(&(0x7f0000000800)='./file0\x00', 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x43) name_to_handle_at(r1, &(0x7f0000000840)='./file0\x00', &(0x7f0000000780)=@ceph_nfs_fh={0x8}, &(0x7f00000007c0), 0x400) r2 = open(&(0x7f0000000040)='./file0\x00', 0x185400, 0x163) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae03, 0x28) mount(&(0x7f00000009c0)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)='cgroup2\x00', 0x0, &(0x7f0000000a80)='overlay\x00') mount$overlay(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f00000008c0), 0x82f883, &(0x7f0000000900)=ANY=[@ANYBLOB="78696e6f3d6175746f2c776f006b646e83d1a8f3ee141965302c75707065726469723d2e2f66696c65302c6d657461636f70793d6f6e2c78696e6f3d6175746f2c696e6465783d6f6e2c78696e6f3d6f66662c7569643d", @ANYRESDEC=0xee01, @ANYBLOB="2c6d61736b3d5e4d41595f57524954452c6f626a5f747970653d5d2d2d233a5ea12c00"]) fsetxattr$security_ima(r3, &(0x7f00000000c0), &(0x7f0000000300)=ANY=[@ANYBLOB="03010c000000020099a90758b4674bd0883cf86cdba099f24b2d51dba27c0c50919bea68abaa40b993b84805d58cad5d5c51a38a07ae2682e167ca92125372c2ac2a7813b14ac7d083a1dca95ece0e8c9fd74c6cdb5cfd0ef03b0cad565bb38bbe5f986d5f728ffc2f07a1c223299e5e76064bd3fcf9af5779b6b1250de8d73f10d70304ce874f67bbc445bfe4a23c2503e52a6157ffe6909caac59693784d8b78896fed4b21e98774bff7d236f0c5ba998476b321b6327f014ac1dab5a1c5ece7a603de96713459bbec1891a2a96769a3f95408d743ee14938d2e9795b01ece0e7d2f0206eb548414bd3a9097887b7b0311"], 0xa2, 0x0) r4 = pidfd_getfd(r2, r0, 0x0) bind$unix(r4, &(0x7f0000000200)=@abs={0x1, 0x0, 0x4e24}, 0x6e) 06:01:46 executing program 5: fork() ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r0 = getpgrp(0x0) capset(&(0x7f0000000000)={0x0, r0}, 0x0) mq_notify(0xffffffffffffffff, 0x0) recvmsg$can_j1939(0xffffffffffffffff, 0x0, 0x2121) r1 = getpgrp(0x0) capset(&(0x7f0000000000)={0x20080522}, 0x0) setpgid(0x0, r1) [ 374.406968][T13273] VFS: could not find a valid V7 on nbd1. [ 374.456467][T13275] VFS: could not find a valid V7 on nbd1. 06:01:46 executing program 4: r0 = openat$vim2m(0xffffff9c, &(0x7f0000000140), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0cc5605, &(0x7f0000000280)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x10001, 0x0}}) 06:01:46 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000000180)=0x101, 0x4) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e25, 0x0, @empty}, 0x1c) getpeername$inet6(r1, 0x0, &(0x7f0000000140)) ioctl$DRM_IOCTL_MODE_ATOMIC(r1, 0xc03864bc, &(0x7f0000000200)={0x101, 0x2, &(0x7f0000000040)=[0x4, 0xd9], &(0x7f00000000c0)=[0x7], &(0x7f0000000100)=[0x9, 0x4], &(0x7f0000000180)=[0x9]}) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(r1, &(0x7f0000000240)='./file0\x00', 0x400000, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) [ 374.675193][T13277] loop0: detected capacity change from 0 to 3 [ 374.739568][T13283] cgroup2: Unknown parameter 'overlay' [ 374.809287][T13283] loop0: detected capacity change from 0 to 3 [ 374.904086][T13277] cgroup2: Unknown parameter 'overlay' [ 375.192854][ T1988] nbd_handle_cmd: 2 callbacks suppressed [ 375.192936][ T1988] block nbd1: Attempted send on invalid socket [ 375.205358][ T1988] print_req_error: 2 callbacks suppressed [ 375.205411][ T1988] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 375.239883][T13303] VFS: could not find a valid V7 on nbd1. [ 375.342790][ T2038] block nbd1: Attempted send on invalid socket [ 375.349231][ T2038] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 375.378550][T13307] VFS: could not find a valid V7 on nbd1. 06:01:48 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) kcmp(r3, r1, 0x2, r2, r2) 06:01:48 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:01:48 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(r1, 0xee00, 0x0) syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x3, 0x4, &(0x7f0000000180)=[{&(0x7f0000000200)="f4555e4e7dd0a5502bdc92c5365d1b3b53d4798ab8086c2c56238a4d0d084dfa89a605d3b1a17e340e27fd7f3537ccfc9b43e754af80546639e47e5d1f3707b5eda89c341f291a9db5ee94e00d44cfba9fb7a4c0bef0e73fb4ae029f1fc7cb4e647025b443c2e6146ed7c79479bbbe9b5d7d3678231dfd7754db242edb212200a81c1e75a4a523b6c3459b952a89b7028db999ec7936440ae11fa5c7ca6a721e26dc5d83fda8eafdd1870bd68d62bfca12edf9a663b9627645a883ad538ca04c046a54132a2805d65f1bf53a419ff76d342cd1aa7c7d97d106fac18455a6fc68604b32275302da68d36550f1a6a4154131483341848129", 0xf7, 0x7ba0}, {&(0x7f0000000300)="594d2f7ee341925c3aeff9ab36871e02d68ea863524ed9c2c9cd19c7152e006a210b865eb2aeebc5ce74df21bba92e788e711b852ddede8262a4a3da9603609267205ebe2391db266f123f8163a0c7e0f148a02c20fd97ea9c9dc62a76886326fd7eb72ea63d757b5ce8d4c143f07e89262066a735873e438cb7528d2c0027501dc84b30ce84bcb84956552e7483c210d8dc9d8902854b23ca90cd9ecafa61d97846fcfb07273c1460610554ad7ead3df88f06", 0xb3, 0x5}, {&(0x7f0000000100)="b06e26fc34b67d86b03e902dfd69e6c13c58e91a50735e5485a3af80bcc678c6d5be7993a0daf1dfc97742f8119140acb8", 0x31, 0x5}, {&(0x7f00000003c0)="1b7433d0455754816917ec0c8f67f3dc37eda04946143408596e17f8eadbe8735d17c0cce22aa1cc3c3929548e3df501be09861359dc4c71f26df5d139aad4f0b3d1137adfc3cd80c987bada5320e67f7d7c3fe7cd54a318d81d2d53aecedcdaa74f7ea0d4f4b498", 0x68, 0xcdf8f039}], 0x100a, &(0x7f0000000440)={[{}, {@disable_sparse_yes}, {@fmask={'fmask', 0x3d, 0x10001}}, {@gid={'gid', 0x3d, r1}}, {@case_sensitive_no}, {@umask={'umask', 0x3d, 0x2}}], [{@smackfsfloor}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@appraise_type}]}) 06:01:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) 06:01:48 executing program 1: mount(&(0x7f0000000040)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='sockfs\x00', 0x21000, 0x0) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) 06:01:48 executing program 5: shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000180)={{0x1, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) [ 376.937520][ T1988] block nbd0: Attempted send on invalid socket [ 376.938588][ T2038] block nbd1: Attempted send on invalid socket [ 376.943912][ T1988] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 376.950132][ T2038] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 376.986843][T13322] VFS: could not find a valid V7 on nbd0. [ 376.991729][T13321] VFS: could not find a valid V7 on nbd1. [ 377.040412][ T2038] block nbd1: Attempted send on invalid socket [ 377.047178][ T2038] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 377.070321][T13325] VFS: could not find a valid V7 on nbd1. 06:01:49 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000000180)=0x101, 0x4) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000400)={0xa, 0x4e25, 0xfffff4e7, @empty}, 0x1c) mkdir(&(0x7f00000003c0)='./file0\x00', 0x184) getpeername$inet6(r1, 0x0, &(0x7f0000000140)) statx(r1, &(0x7f0000000280)='./file0\x00', 0x100, 0x8, &(0x7f00000002c0)) syz_mount_image$qnx4(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000100)=[{0x0, 0x0, 0x3}, {&(0x7f0000000200)="aa284071208276a781bfe3e98564b1023482caecccff97f5e058b4c1ce8c3e3dc4372e9d6d03ad1fa09faa3a33c283867ccbe1ff68198143a3e10fb1d72e3c2af16b80e7f9e07ee65d6469ec285d5de0400b6358c6", 0x55, 0x2}], 0x1021020, &(0x7f0000000180)={[{'#'}, {'v7\x00'}, {']%,/),('}, {':.\x00'}, {'/dev/nbd'}, {'v7\x00'}, {'[]+@[+-'}, {'v7\x00'}]}) [ 377.139770][T13326] IPVS: ftp: loaded support on port[0] = 21 [ 377.197566][T13324] loop0: detected capacity change from 0 to 264192 06:01:49 executing program 4: ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) getpid() getuid() read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006500)={0x2020}, 0x2020) syz_usbip_server_init(0x7) syz_open_dev$sg(&(0x7f0000000a40), 0xb04, 0xc0000) [ 377.288491][ T1988] block nbd0: Attempted send on invalid socket [ 377.295115][ T1988] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 377.311760][T13322] VFS: could not find a valid V7 on nbd0. 06:01:49 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x401c5820, 0x0) [ 377.444275][T13334] IPVS: ftp: loaded support on port[0] = 21 06:01:49 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="c1c978426465762f0e2a50e2000096380000000000f0085bf72c755581aaba4302c6381ca55b7da580b83b54789c0c75ff7d8e40fec657be00dbdce9ccb34d74c9386c6c5a696ac41a88f02b9f8fbe580cab796b3e19f7ca0f514ef2458ee8bc5dd70beeb7bd1f3924d05bdc198af0"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) [ 378.026740][ T1988] block nbd1: Attempted send on invalid socket [ 378.033271][ T1988] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 378.050962][T13380] VFS: could not find a valid V7 on nbd1. [ 378.128131][T13384] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 378.147916][ T1988] block nbd1: Attempted send on invalid socket [ 378.154599][ T1988] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 378.173310][T13380] VFS: could not find a valid V7 on nbd1. 06:01:50 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) kcmp(r3, r1, 0x2, r2, r2) 06:01:50 executing program 5: openat$nvme_fabrics(0xffffff9c, &(0x7f00000001c0), 0x0, 0x0) 06:01:50 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:01:50 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/128) r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000000180)=0x101, 0x4) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e25, 0x0, @empty}, 0x1c) getpeername$inet6(r1, 0x0, &(0x7f0000000140)) r2 = socket$inet6(0xa, 0x4, 0x81) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x71}, 0x1c) renameat(r1, &(0x7f00000000c0)='./file1\x00', 0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00') [ 378.730652][T13384] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 378.861083][T13395] IPVS: ftp: loaded support on port[0] = 21 06:01:50 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) [ 379.139807][T13402] IPVS: ftp: loaded support on port[0] = 21 06:01:51 executing program 4: msgget(0x0, 0x600) 06:01:51 executing program 5: getresgid(&(0x7f0000000b40), &(0x7f0000000b80), &(0x7f0000000bc0)) [ 379.988730][ T1988] block nbd0: Attempted send on invalid socket [ 379.995229][ T1988] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 380.052074][T13439] VFS: could not find a valid V7 on nbd0. 06:01:52 executing program 4: r0 = openat$vim2m(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$vim2m_VIDIOC_TRY_FMT(r0, 0xc0cc5640, &(0x7f0000000040)={0x1, @pix_mp={0x1ff, 0xffff9937}}) 06:01:52 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r3) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsuid(r5) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r7) getresgid(&(0x7f0000000100)=0x0, &(0x7f0000000180), &(0x7f0000000200)) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f0000000300)={'wlan0\x00'}) r9 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(r10, 0xee00, 0x0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000240)={{}, {0x1, 0x3}, [{0x2, 0x0, r1}, {0x2, 0x4, r3}, {0x2, 0x4, r5}, {0x2, 0xb, 0xee00}, {0x2, 0x3, r7}, {0x2, 0x5, 0xee01}], {0x4, 0x2}, [{0x8, 0x0, 0xee00}, {0x8, 0x0, 0xee00}, {0x8, 0x2, r8}, {0x8, 0x1, 0xee00}, {0x8, 0x5, r10}], {0x10, 0xc8cd23fac3c6e48a}, {0x20, 0x4}}, 0x7c, 0x4) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) 06:01:52 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) syz_mount_image$qnx6(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x9, 0x0, &(0x7f0000000180), 0x2040001, &(0x7f0000000300)={[{'v7\x00'}, {'v7\x00'}]}) 06:01:52 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) kcmp(r3, r1, 0x2, r2, r2) 06:01:52 executing program 5: r0 = openat$vsock(0xffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$FBIOPUTCMAP(r0, 0x4605, 0x0) 06:01:52 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) [ 380.775481][ T1988] block nbd1: Attempted send on invalid socket [ 380.781973][ T1988] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 380.798139][T13462] VFS: could not find a valid V7 on nbd1. [ 380.872158][ T1988] block nbd0: Attempted send on invalid socket [ 380.878788][ T1988] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 380.897292][T13465] VFS: could not find a valid V7 on nbd0. [ 380.971096][ T1988] block nbd0: Attempted send on invalid socket [ 380.977886][ T1988] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 380.990093][T13465] VFS: could not find a valid V7 on nbd0. 06:01:53 executing program 4: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x2c, r0, 0x1, 0x0, 0x0, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x5}]}]}, 0x2c}}, 0x0) [ 381.133723][T13475] IPVS: ftp: loaded support on port[0] = 21 [ 381.473940][T13482] IPVS: ftp: loaded support on port[0] = 21 06:01:53 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000000180)=0x101, 0x4) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e25, 0x0, @empty}, 0x1c) getpeername$inet6(r1, 0x0, &(0x7f0000000140)) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) statfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=""/105) write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000000200)={0x8, {"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", 0x1000}}, 0x1006) 06:01:53 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000440), 0x8) [ 382.284372][ T2038] block nbd0: Attempted send on invalid socket [ 382.293078][ T2038] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 382.309842][T13527] VFS: could not find a valid V7 on nbd0. 06:01:54 executing program 5: socket(0x1, 0x0, 0x2324) 06:01:54 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000a40), 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, 0x0) 06:01:54 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) kcmp(r3, r1, 0x2, r2, r2) 06:01:54 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x800420, &(0x7f0000000100)={[{@nr_inodes={'nr_inodes', 0x3d, [0x2b0e2710519c68d1]}}], [{@fowner_eq}]}) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) rename(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file0\x00') rename(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='./file0\x00') 06:01:54 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 06:01:55 executing program 4: r0 = gettid() kcmp(0x0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 383.268565][T13552] IPVS: ftp: loaded support on port[0] = 21 [ 383.520873][ T2038] block nbd0: Attempted send on invalid socket [ 383.527491][ T2038] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 383.598353][T13567] VFS: could not find a valid V7 on nbd0. [ 383.807407][ T1988] block nbd0: Attempted send on invalid socket [ 383.813945][ T1988] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 383.835728][T13554] VFS: could not find a valid V7 on nbd0. 06:01:55 executing program 4: fork() shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000280)=""/135) 06:01:56 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) kcmp(r3, r1, 0x2, r2, r2) [ 384.456437][T13589] IPVS: ftp: loaded support on port[0] = 21 06:01:58 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:01:58 executing program 5: syz_open_dev$sndpcmp(&(0x7f0000000400), 0xc, 0x416003) 06:01:58 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) r0 = openat$dir(0xffffff9c, &(0x7f0000000040)='./file0\x00', 0x200000, 0xc1) readlinkat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=""/4096, 0x1000) 06:01:58 executing program 4: connect$caif(0xffffffffffffffff, 0x0, 0x0) 06:01:58 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) kcmp(r3, r1, 0x2, r2, r2) [ 386.490324][T13620] IPVS: ftp: loaded support on port[0] = 21 [ 386.594262][ T2038] block nbd0: Attempted send on invalid socket [ 386.600740][ T2038] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 386.652932][T13621] VFS: could not find a valid V7 on nbd0. [ 386.976528][ T3124] ieee802154 phy0 wpan0: encryption failed: -22 [ 386.983285][ T3124] ieee802154 phy1 wpan1: encryption failed: -22 06:01:59 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x200000, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) [ 387.179698][T13635] IPVS: ftp: loaded support on port[0] = 21 06:01:59 executing program 4: r0 = msgget(0x3, 0x0) msgctl$MSG_STAT(r0, 0xb, 0x0) 06:01:59 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'syztnl1\x00', 0x0}) [ 387.969147][ T2038] block nbd0: Attempted send on invalid socket [ 387.975577][ T2038] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 388.037963][T13673] VFS: could not find a valid V7 on nbd0. 06:02:00 executing program 4: setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000000)=@req={0x8, 0x7f, 0x7fff, 0x241aa5b0}, 0x10) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x1, 0x1, 0x6, @random="16bcfe48ba2f"}, 0x14) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x4}, 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x10000, 0x30}, &(0x7f0000000140)=0xc) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000180)={r0, 0x4}, &(0x7f00000001c0)=0xc) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000200)={r1, @in6={{0xa, 0x4e22, 0x7f, @mcast2, 0x5}}}, &(0x7f00000002c0)=0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000340)={r3, 0x0, &(0x7f0000000300)}, &(0x7f0000000380)=0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000003c0)={r3, @in={{0x2, 0x4e22, @local}}, 0x5, 0x5, 0x10001, 0x0, 0x3, 0x2, 0x4}, 0x9c) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000480)={'ip6tnl0\x00', 0x0, 0x29, 0x4, 0x0, 0x2, 0x4, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x80, 0x7, 0x9000}}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000540)={r3, 0x7}, &(0x7f0000000580)=0x8) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f00000005c0), &(0x7f0000000600)=0x4) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000640)={r1, @in6={{0xa, 0x4e23, 0x3ff, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)={0x0, 0xdc, "c5be441a1be10bf757bd882d070fbf0f0640c938cdcd06e0ddb50f92fd173c7af300abc0b3c30310805d8931f612dc56bc581d6f49ffa5012a7466494caca1fe392549de397ec67c216a49b555fb8ac0c828e9e9bc9dd64fba71365e1c465d0707215a2daaa003dbdbc60af670e6e4cd4fd16e0e63e572a543284ac185b4910524d33f1c5b5689e25854635ade1d09d1febbda7d4375bbdcdcf1b24e33befd5d69ce52cd1112d537536416661168c1dedd8509dcc467d79af5fea474f1c65b7bdd2d30b8259613ec978fc4931d1c5be9f827ae5a258e0694b6633261"}, &(0x7f0000000800)=0xe4) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000009c0)={'sit0\x00', &(0x7f0000000940)={'syztnl1\x00', 0x0, 0x2f, 0x8, 0x7f, 0x9, 0x0, @remote, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7810, 0x8, 0x3b, 0x5}}) 06:02:00 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="00e9ffffff635dc943c0"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) 06:02:00 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) ptrace$getregset(0x4205, r2, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r2, r0, 0x2, r1, r1) 06:02:00 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) kcmp(r3, r1, 0x2, r2, r2) 06:02:00 executing program 5: getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e24, @local}}}, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000002c0)={0x0, 0x47, "045557227453d02c84088feb41c46c432f29f0ee824035d26876198ec591c6f0821b510bd611fb7cedb01f4578ce1a5fbb6c97ef0c259734ef5b9a0eb58472193ecbc05d329c13"}, &(0x7f0000000340)=0x4f) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000380)={r0}, 0x8) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000400)) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000440)={0x0, 0x4}, &(0x7f0000000480)=0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000004c0)=@assoc_value, &(0x7f0000000500)=0x8) [ 389.059947][T13687] IPVS: ftp: loaded support on port[0] = 21 [ 389.497894][T13695] IPVS: ftp: loaded support on port[0] = 21 [ 389.645117][T13704] sctp: [Deprecated]: syz-executor.5 (pid 13704) Use of struct sctp_assoc_value in delayed_ack socket option. [ 389.645117][T13704] Use struct sctp_sack_info instead 06:02:01 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)={0x0, 0x1, "ff"}, &(0x7f0000000200)=0x9) 06:02:01 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000200)=ANY=[@ANYBLOB="5b2aedb3799b48b67f202653f5b974aacb06db4e3c00ecddaf101134ab0203cc76549051b353ae7bae344f0849a47127f11e4e7994454d5dfc6af5584c731c7604e6e74d1e9e0985b4519385d66ba88315c6b0db546b51933be67f1422cdc7fed8e7866f4d00bf788a6a855b6316289188eda83eee59a492f7922f67500a209e45504ad0148de7ea18b861ecf83ff81470ddc70f322d19979708f7228c0e27e2132684b86ba21c51ca3c3e49412eaa05f031cdef2ddd3668e9ab9318f0d8362a69dcfb00000000000c1aeae8954f78ec36f54ca56f5c36fa5ad596e24c000000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) 06:02:02 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) ptrace$getregset(0x4205, r2, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r2, r0, 0x2, r1, r1) 06:02:02 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000340)={'ip6gre0\x00', &(0x7f00000002c0)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private0, @empty}}) 06:02:02 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) kcmp(r3, r1, 0x2, r2, r2) 06:02:02 executing program 4: setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, &(0x7f0000000340)) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000380)={0x0, 0x273b}, 0x8) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0)={0x0, 0x7}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000440)={0x0}, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000004c0)=@assoc_value={r0, 0x80000001}, &(0x7f0000000500)=0x8) 06:02:02 executing program 0: bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={0xffffffffffffffff, 0x8, 0x1, 0x49760968, &(0x7f0000000040)=[0x0, 0x0], 0x2}, 0x20) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2f64ff03000000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) [ 391.068327][T13746] IPVS: ftp: loaded support on port[0] = 21 06:02:03 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty}, 0x1c, &(0x7f0000000100)=[{0x0}, {0x0}], 0x2, &(0x7f00000001c0)=[@authinfo={0x18}], 0x18}, 0x0) [ 391.601025][T13759] sctp: [Deprecated]: syz-executor.4 (pid 13759) Use of struct sctp_assoc_value in delayed_ack socket option. [ 391.601025][T13759] Use struct sctp_sack_info instead 06:02:03 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) ptrace$getregset(0x4205, r2, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r2, r0, 0x2, r1, r1) [ 391.878146][T13756] IPVS: ftp: loaded support on port[0] = 21 [ 391.959487][T13778] sctp: [Deprecated]: syz-executor.4 (pid 13778) Use of struct sctp_assoc_value in delayed_ack socket option. [ 391.959487][T13778] Use struct sctp_sack_info instead 06:02:04 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) 06:02:04 executing program 4: socket$packet(0x11, 0x3, 0x300) io_uring_setup(0x756c, &(0x7f00000000c0)={0x0, 0x5f32, 0x1, 0x1}) r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r0, 0x107, 0x0, 0x0, &(0x7f0000000180)) 06:02:04 executing program 5: r0 = epoll_create1(0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) [ 392.696228][T13804] IPVS: ftp: loaded support on port[0] = 21 [ 392.996821][ T1988] block nbd0: Attempted send on invalid socket [ 393.003258][ T1988] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 393.040839][T13808] VFS: could not find a valid V7 on nbd0. 06:02:05 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:02:05 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f0000000040)='./file0\x00', 0xdfffffff, 0x0, 0x0, 0x20808a0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) 06:02:05 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0x5452, &(0x7f0000000100)) 06:02:05 executing program 5: socketpair(0x2, 0x3, 0x0, &(0x7f0000000200)) [ 393.944325][T13837] IPVS: ftp: loaded support on port[0] = 21 06:02:06 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) [ 394.155266][ T2038] block nbd0: Attempted send on invalid socket [ 394.161659][ T2038] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 394.209157][T13843] VFS: could not find a valid V7 on nbd0. 06:02:06 executing program 4: socket$caif_stream(0x25, 0x1, 0x0) 06:02:06 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@sr0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) 06:02:06 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:02:07 executing program 5: socket(0x1e, 0x0, 0x705) [ 395.077855][T13873] IPVS: ftp: loaded support on port[0] = 21 06:02:07 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) 06:02:07 executing program 4: sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, 0x0, 0x0) [ 395.886003][T13904] IPVS: ftp: loaded support on port[0] = 21 06:02:08 executing program 5: openat$uhid(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) [ 396.115065][ T2038] block nbd0: Attempted send on invalid socket [ 396.121405][ T2038] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 396.145999][T13907] VFS: could not find a valid V7 on nbd0. 06:02:08 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:02:08 executing program 0: r0 = syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(r0, &(0x7f0000000200)='./file0\x00', 0x181000, 0x102) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2f6660a9b850670043236d0033928027f3192e0a6aa586271865f79c45b466990e1827f927f154d7c9b4bd23209dc4ed7d6c499a1f88539d494c5b5793415dbf07a004698f2d34c3e7367af8922260f6dacb42444c1e685fc385d3aeb17059b2e3149a44f85f35641c4acdec9945db1f2e1eafc2cd982cf346973286ffda2e404f91c70731e5533d7711469a0866be64110af02f0669e6018cf7be5acaa94a2922723385663139821ab44f09bb63e925e512aaba98b6d332522835073fd4920140a85b94e45385d1ac3a999e46dba5e7ba4c691779e6e2b8545282f47141609c40d0096358ee3a25daabdd08"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) name_to_handle_at(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@ceph_nfs_confh={0x10, 0x2, {0x101, 0x4}}, &(0x7f0000000180), 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x8001) 06:02:08 executing program 4: getresgid(&(0x7f00000000c0), &(0x7f0000000140), 0x0) [ 397.002750][T13936] IPVS: ftp: loaded support on port[0] = 21 06:02:09 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x723}, 0x14}}, 0x0) 06:02:09 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:02:09 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) mount(&(0x7f0000000040)=@md0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='devpts\x00', 0x2b028, &(0x7f0000000180)='$\x82}/-\x00') 06:02:09 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:02:09 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$UHID_SET_REPORT_REPLY(r0, 0x0, 0x0) [ 397.755313][T13969] IPVS: ftp: loaded support on port[0] = 21 06:02:09 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_REWIND(r0, 0x40084146, 0x0) [ 397.943443][ T1988] block nbd0: Attempted send on invalid socket [ 397.949826][ T1988] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 397.969257][T13972] VFS: could not find a valid V7 on nbd0. [ 397.981460][ T1988] block nbd0: Attempted send on invalid socket [ 397.988176][ T1988] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 398.015058][T13972] VFS: could not find a valid V7 on nbd0. [ 398.199160][T13976] IPVS: ftp: loaded support on port[0] = 21 06:02:10 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x2, &(0x7f0000000180)=[{&(0x7f0000000100)="607f69003ac6b1815b1b3824c0cfe37aa62437e51638c74651c3548e4f1e098afb35ded59baf37bc5abc1538a216b43f56398f1c7486d6", 0x37, 0xaf}, {&(0x7f0000000200)="d8499b22306c33549585d0ebf2505b63c55155ef6768488fc4ad12c03a68c3767cef35123e77a6767647cd893415fcf0ca30e2ed62c5cb57f95373f1535017ec50b55b4738a63c9d59fad9816f966012bce32cd7cb22ff0799fbf92e6b86e1aa0f5d120ba0551389ffb1a853b23d5a31e89d21283953bbec1ca112def49a99bb657d15fbf2f5f6c66dab378a5ca55c4800aa5785bab66583fd013ad1d74c92b3fd939e9b9fbfedae07450ff2", 0xac, 0x3}], 0x300d040, &(0x7f00000002c0)={[{'v7\x00'}, {}, {'\\'}, {'/dev/nbd'}, {'v7\x00'}], [{@fowner_gt={'fowner>', 0xee01}}]}) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) 06:02:10 executing program 4: rt_sigaction(0x33, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x8, &(0x7f00000001c0)) 06:02:11 executing program 5: r0 = io_uring_setup(0x65d1, &(0x7f0000000340)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000005c0)=[{0x0}, {&(0x7f0000001ac0)=""/4096, 0x1000}], 0x2) [ 399.302746][ T4677] Bluetooth: hci3: command 0x0406 tx timeout [ 399.419710][ T1988] block nbd0: Attempted send on invalid socket [ 399.426232][ T1988] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 399.437499][T14027] VFS: could not find a valid V7 on nbd0. [ 399.450808][ T1988] block nbd0: Attempted send on invalid socket [ 399.457596][ T1988] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 06:02:11 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) kcmp(r3, r1, 0x2, r2, r2) [ 399.473158][T14032] VFS: could not find a valid V7 on nbd0. 06:02:11 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)=""/243, 0xf3) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) 06:02:11 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:02:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) [ 400.030508][T14041] IPVS: ftp: loaded support on port[0] = 21 [ 400.192617][T14043] IPVS: ftp: loaded support on port[0] = 21 [ 400.250844][ T2038] block nbd0: Attempted send on invalid socket [ 400.259676][ T2038] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 400.298477][T14046] VFS: could not find a valid V7 on nbd0. [ 400.611970][ T2038] block nbd0: Attempted send on invalid socket [ 400.621434][ T2038] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 400.711518][T14065] VFS: could not find a valid V7 on nbd0. 06:02:12 executing program 5: syz_open_dev$ndb(&(0x7f0000000140), 0x0, 0x2200) 06:02:13 executing program 4: io_uring_setup(0x756c, &(0x7f00000000c0)={0x0, 0x5f32}) 06:02:13 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='v7\x00', 0x8000, 0x0) chdir(&(0x7f0000000080)='./file0\x00') 06:02:13 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:02:13 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) kcmp(r3, r1, 0x2, r2, r2) 06:02:13 executing program 5: socket$inet(0x2, 0xa, 0x9) [ 401.780608][ T2038] block nbd0: Attempted send on invalid socket [ 401.787661][ T2038] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 401.812975][T14103] VFS: could not find a valid V7 on nbd0. [ 401.913688][T14104] IPVS: ftp: loaded support on port[0] = 21 06:02:14 executing program 4: socket(0x979b67fd2c56240f, 0x0, 0x0) [ 402.318326][T14115] IPVS: ftp: loaded support on port[0] = 21 06:02:14 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2f6465762f6e6264b000"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='ceph\x00', 0x8000, 0x0) [ 402.452289][T14117] syz-executor.5 uses obsolete (PF_INET,SOCK_PACKET) 06:02:15 executing program 5: r0 = add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)='f', 0x1, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000280), 0x0, 0x0, 0x0, r0) 06:02:15 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCDELRT(r0, 0xc0189436, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @dev}, @rc={0x1f, @fixed}, @tipc}) 06:02:15 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) [ 403.227321][T14159] ceph: No path or : separator in source 06:02:15 executing program 0: syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x1008000, 0x0) [ 403.666309][T14166] IPVS: ftp: loaded support on port[0] = 21 06:02:15 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000001180)={0x0, 0x20, &(0x7f0000001080)=[@in={0x2, 0x0, @rand_addr=0x64010101}, @in={0x2, 0x0, @broadcast}]}, &(0x7f00000011c0)=0x10) 06:02:15 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x83, &(0x7f00000004c0), &(0x7f0000000500)=0x20) 06:02:15 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) kcmp(r3, r1, 0x2, r2, r2) [ 404.141530][ T2038] block nbd0: Attempted send on invalid socket [ 404.148076][ T2038] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 404.172630][T14179] VFS: could not find a valid V7 on nbd0. 06:02:16 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, 0x0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, 0x0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, 0x0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(0x0, 0x0) ptrace$getregset(0x4205, r2, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r2, 0x0, 0x2, r1, r1) [ 404.273447][ T1988] block nbd0: Attempted send on invalid socket [ 404.279834][ T1988] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 404.310911][T14191] VFS: could not find a valid V7 on nbd0. [ 404.766432][T14199] IPVS: ftp: loaded support on port[0] = 21 06:02:16 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x3, 0x2, &(0x7f0000000100)=[{&(0x7f0000000200)="ebe39a8454cf85f6366fc83f1cdee276088299499e60609e1fcf6719b3b8b904e606808710ddff5c2d7f10a868e1613f0d3595c8f22234f6cce1388526a283c54c20af06ceeb9f7408c2c8e31e7fa807472cd3a4a78d8368744cdde7d4bfc95ca25739936f25ac1e3b539ed6660527c36d89a6e4ea547cf819ecad86da5455c074ee1b958689b5dbb9f580141cd8d5f465a76334dbf6150f86562ebfaf2ffca1b967d0256020d90eb0e6af95417de72dc3bdda243a96ba548447a0492edc9ea9cf52cab3920209a89eb1a3ac", 0xcc, 0xff}, {&(0x7f0000000300)="c756bb7d11ff0cf55bc126992979f3e59d87194abe244965685bc8045dd7e1f6545b60f67dc9bd6b2480dc8aa5c82509a2587971f372b8b0fbacb41da13fe1bdfb0c234f31494aafb23ef433ecae7115c06068371bc995853a99641444198b2766f1895bde28645ba53c9228", 0x6c, 0xffffffe9}], 0x10082, &(0x7f0000000380)={[{@jqfmt_vfsv0}, {@noattrs}, {@tails_small}], [{@obj_type={'obj_type', 0x3d, 'v7\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x14000000000}}]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001780)={{{@in6=@private1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in=@multicast1}}, &(0x7f0000001880)=0xe4) r1 = socket(0x10, 0x2, 0x0) syz_mount_image$adfs(&(0x7f0000001900), &(0x7f0000001940)='./file0\x00', 0x11, 0x7, &(0x7f0000001e00)=[{&(0x7f0000001980)="e301a3a97d1d330b18c3438b57eb86e31dc89231520c7728e700b2c909c94870ebce8206105281dae6a94d383ead2262670b08dc01e11fb1cd9854f6b0097ac2c828d8a70a44efb7b54025dc955516ae8b9823c6904b645504cc1470485abf05ddc1a08c8acb22332ab0c2202b7bfc5a9fd12293e9006dc512b564fa1be7c49b759441cd6c18181df70478b97502fcc5bb39792e7615d7d2fa4ec899f48085c44ab3c6f85f6edfcf58cd263266a853d4750e48d6bc06f8c31b3417e4cf483f97d50ed9d690b601bb5eb4cda12e7dd4bebd66cd2a45e52d0fe206fe5ebd", 0xdd, 0xda}, {&(0x7f0000001a80)="c838bbf147d198e8abb900c7c70759e8cc4f85690bcf1ecb43b0e2a703047911d328e09d55eb627c4752b13d1ea0e16eb7a21810633b4d5d1b51af1644bce82ecb174b92ddb69382eb1d66960a19c5684a1f6f809bfc1b20a3d9a5ab0eefa2ff7e74c22693581bca5e9bb8460035164a61cad60a42ffd3a645cec8f0", 0x7c, 0x4}, {&(0x7f0000001b00)="6dea850a9faaffaa785a047334f3ab85e7653f08049014ec48377dec91536024540e41dc58c582d039d7dc727993eec8f3b8c27667c0758eebae0ab7f81568894ccd9ed1b5f427f7dfd1b2b276a17b3e2fac3f50d9d0d874048b45c5581400d736fcc6bf1b3f3fd52aacf5d2153c9622c8cab808b9cfe099c0456aa0e224f1b54f331ba68d240c855706247e7f08de5714faa9f2310697f6219e6e0463d3754215d026ae78ec6263c1f51e740d34be100fea2ef06beed020", 0xb8, 0x1}, {&(0x7f0000001bc0)="1f3bc80943ec75eaa9c4cdcf563f134bdc403f35e103cbdff508836ae531ac82af29261e8dcc685e9866cf452ed4f8f81a87ac920c78a8429c5bef7d524a55798e1a9599ea5a8a63965b22", 0x4b, 0xcb}, {&(0x7f0000001c40)="4e531096cd2d7e6a56f50eda54d220a4ed2a66f820f425385e0c4220f9794bbe4b571b8eaaa8e0e2206231492eeecf4e188d154b0eb1b13f551b4e19349ebc16f890bad1e8976c5b7ed4a9cb2c0050d7bb4c346fa997987446331e27b63c3017ad83b7b4d417f8180dea32349a9b813fbb057f8b1a12eebc8078b41f407ee9289b2b526ebf4c4f66925e4e61ac7e47615245057ba63ff75a74fc26efaa5afa9f6eed10c2703d9786d575c99372deb118abc42aab36edd2653da5b517521d9a852d08a0692cad3bac4c1f77ce3d2311d71d8dbdcca7bc0fdd52b28032ebbaf945ead17c4b059b6a485701fcd9956f730e0e53cb", 0xf3, 0x400}, {&(0x7f0000001d40)="8af155e2f706ab3a7adb170b515470b8947021ca763a71762cd74644d2a0157e5befce3cc491040ca32ee3c738dd8104478cd26689aaf2d3d4aadef72c812c085371eea3f55d5bde3cde2e938370af07871f24c7b6a38f654a439bdf8f727f2eb3924058dc4c6120b8e1148406", 0x6d, 0x3}, {&(0x7f0000001dc0)="70730687edabf36a92a1d8fb28", 0xd, 0x5}], 0x100000, &(0x7f0000001e80)={[{'-(--'}, {'smackfsdef'}, {']$'}, {'v7\x00'}], [{@dont_appraise}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@appraise}, {@fsname={'fsname', 0x3d, '^}:&[&@-*/).%-\','}}]}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(r2, 0xee00, 0x0) syz_mount_image$squashfs(&(0x7f0000001f40), &(0x7f0000001f80)='./file0\x00', 0x1800, 0x9, &(0x7f0000002680)=[{&(0x7f0000001fc0)="20550ba952fb98cf6df155fe47ab6e4a64a04cf9d4a503ce421a667eb0412c767f22c4a7810e5c082def9c727374129b31d59b8cf31fdedf31ec8f2fc328304182fbba22e80ad9fd7fc1f1395e01b8ecf1734272be13731bc63a5d93c9adf1d59e4cd401d3362d8343448115dd1a729148ba8cbbc782", 0x76, 0x9}, {&(0x7f0000002040)="8e13cdc3ea06eaf8a17685bcc789bf280772c103af15dd2824154b98613be0baec7dd586ff068ee13079e46f92c71118a6cbf0d0b0b33a57bece3d726201fde4354154ce46a787dc7c52be5105bfd65b38d8ebfd81d7e850add46c65bfd372109a64187bb6aa4d2b991f4a0f9ecbf4e59f9f106716d21e425b4f95ce99a41ea4828f551f1f32ec9a984928a4a95ad9d40552192b38a82943d728a16fd61e0239f4f78dc233de6f0babc3908c0ec1228e8e94dff6b20e7ea1c7f92d8578f537ddbccb14980a6b0b00012e32aa8b6c", 0xce, 0x4}, {&(0x7f0000002140)="85ac77cb02e0a8b93bcd5169520c5ca908b293888aad8c3d6735d90e8091ea1ca7c4cf0ffbbf8750e8b0f9a55250124d01198e2e0b74585fd55b0ec5bb95f9cc3d78d89b96d4e09a0367eebb8be3700a363501f0dab9dbfdac7f7b9a7cf055b5b298ce3a0dc545904ba8259dac6484132d77b8652e4144f950adf04fc8e22dc96efae5d423ce3a5e7c88f301ec6dcb3bede4050b8b64beaf0e6471117698f20847030bc2d44268891efc79a252290d653c793ffc16fcc2b586c2510e1ea1610b7a6f84546ac3cd6716d631474eb5b0969f2e6284ea7ab5959751d4f3214c8b9116163c0fb5e6b540fc064da1cfba07b9", 0xf0, 0x3}, {&(0x7f0000002240)="6585f0f1bc1257d4a6f3eba9637b2c56968d0c609f0b35913a99d7a8109a6fd1fdb78378bfb3b7ada8a3dc589757ccc7f2bc18760684ffb4aec429d22b1728ae24c35b240b408325aedaf4396c0e3d60e78e99833f073d90b4ee2682b2981595d2", 0x61, 0x1}, {&(0x7f00000022c0)="b37cf548740ba1f33890752c6d6f1a3c29b686cffcbe510ac7a528c3982ef51f11cff5f982caba43f42a1f3b041c8bcd34b3669c5b5adf95c31ea48f65c3f01ce11915091a5623c6fa8fc850efe7fd97f897293484a743", 0x57, 0x200}, {&(0x7f0000002340)="c0a093370d3a895fc4b26af79262ece7089357ecd613bbc98c3d710e09324b37887ff0db36f0503a8807a7eb390b9c0236de42b05c5ac4858134e1a6edb137d0dad73d26aedd5469068329738011327607928d83f28b20d6b06f6112b2b9376d3963ddafd0b10946ef00f0776f4d75ea8b18ae881b27e3db89154aa60be57ab1c22c65f0cb599da1a35ba018f020d98d91b9daf6679fb8c9cd33b92e977a352d156166f1859240cfd09f25cabbb204265f66107ed32297de5a6d6a83adff5937e4ed8695cabc45a2f2789ecd15e84142202b5d2305f6221918", 0xd9, 0x8}, {&(0x7f0000002440)="0bac8c02332f3b79992a0c601b4934fa53161b05e3d43120727a0b62cddf3cb349916663424aedd420d8c0d34fa91836073759f8664f7e83b071a3babf7590b55603782c0fa54d1a45143072fb76fe87246d85fb669baf", 0x57, 0x5}, {&(0x7f00000024c0)="fda54939e904849fc24da37ead83f816be9c0d53163a3daba009efc8d5379121733ef17716e1eeb65887ec87a0a860686acd0d67c5619a4a679ede41d5e499bcd90701a254be3d02dd23d79063ec76c6ed34ac8d8bae769cba0326944d5c2b47f580817d633e7294f54f56d9935839cd0b6fc7ed09768cf5643e865318e57e725fadca3bbea7d59fea8a9b72e47107adb308fb0ec0b2adf36a69654e9daa0e990eef1d1564ca3243570aa8b2d377ec342acb46322f3e9a49c50d4dfa93b20898a0e777485f901185c76ab1e8a679d2e71c", 0xd1, 0xc3}, {&(0x7f00000025c0)="79489b590244c82906fc31dbc3219273adcfada8d74b43c469bda0d486ef3b1038eaa49636eb93dfa03a76a0528961a98f103e68a06068f63c726d6dacc874f2e8da21f2171bf07e3da18b2474c60a64bc5ac0689a7d097cd14963edf4a97fe5c45e95aadbab9ff24dfd43fc51ea85f0a6862d0eef35be0fe54352b11801875e58b936509ead97c70be9b3398cca05c0874f07ce6e5dbefd130e0156c9926aa6beb8eb4612713a44d3a59cda28953c543f77cb87", 0xb4, 0xfa}], 0x40, &(0x7f0000002700)={[{}, {'dont_hash'}, {'noattrs'}], [{@smackfshat={'smackfshat', 0x3d, '\x0e$]'}}, {@euid_gt={'euid>', 0xee00}}]}) setxattr$system_posix_acl(&(0x7f0000001700)='./file0\x00', &(0x7f0000001740)='system.posix_acl_access\x00', &(0x7f00000018c0)={{}, {0x1, 0x6}, [{0x2, 0x6, r0}], {}, [{0x8, 0x4, r2}], {}, {0x20, 0x4}}, 0x34, 0x3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0, 0x0}, &(0x7f0000001600)=0xc) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f0000000400)='./file0\x00', 0x7, 0x4, &(0x7f0000001580)=[{&(0x7f0000000440)="b17b2eec06463041cf98a1e4f845421206b213d22f8ada5441599fb998441bf79e53b841fc3f80d59b1147c9c0fab2febd9763203003a744", 0x38, 0x2}, {&(0x7f0000000480)="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", 0x1000, 0xd53}, {&(0x7f0000001480)="02ea4f9b588d014496848007e9abff0f65941a4a36ae90f3cc3a9841bf4c47f68bdd53bb29fd54c8593c5e5fa1d0d8f0c1417ffdf62e41db5a0b1704ece643917792e532138e2ba4be418afd86bb7edc56756fa9376af1cd31e518106eb3547da3f9b1aa496aeefe221ade3597a7f3e0bd4ce673e9f0db53d676db11a6495d3873e3b5b0d27a3d948fbf78ab41cc843571552c1c721effce", 0x98, 0x80000001}, {&(0x7f0000001540)="b2f06b9a8baa3d4ed62ec72c5e6e471e1482c5dbfe08dad7", 0x18, 0x1f}], 0x2100000, &(0x7f0000001640)={[{@dots}, {@dots}, {}, {@fat=@debug}, {@fat=@usefree}, {@nodots}, {@dots}, {@dots}, {}, {@nodots}], [{@smackfsdef={'smackfsdef', 0x3d, '!&'}}, {@uid_lt={'uid<', r3}}, {@dont_hash}, {@smackfshat={'smackfshat', 0x3d, '\\)&-)'}}, {@euid_gt={'euid>', 0xee01}}]}) mount(&(0x7f0000000040)=ANY=[@ANYRES64], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) 06:02:16 executing program 5: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x20) 06:02:17 executing program 4: add_key(&(0x7f0000000100)='id_legacy\x00', 0x0, &(0x7f0000000180)='f', 0x1, 0xfffffffffffffffe) [ 404.987032][T14201] IPVS: ftp: loaded support on port[0] = 21 06:02:17 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) kcmp(r3, r1, 0x2, r2, r2) [ 405.604998][T14228] loop0: detected capacity change from 0 to 264192 [ 405.639506][T14228] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "obj_type=v7" [ 405.849088][T14239] loop0: detected capacity change from 0 to 264192 06:02:18 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000a40), 0x0, 0x0) write$snddsp(r0, 0x0, 0x0) [ 406.008336][T14228] loop0: detected capacity change from 0 to 264192 [ 406.128681][T14228] REISERFS warning (device loop0): reiserfs_fill_super: Cannot allocate commit workqueue 06:02:18 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000480), 0x34002, 0x0) 06:02:18 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, 0x0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, 0x0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, 0x0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(0x0, 0x0) ptrace$getregset(0x4205, r2, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r2, 0x0, 0x2, r1, r1) [ 406.321375][T14268] IPVS: ftp: loaded support on port[0] = 21 06:02:18 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='/dev/nb`0\x00'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) mount(&(0x7f00000000c0)=@sg0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='incremental-fs\x00', 0x2004, &(0x7f0000000200)='\x00') r0 = socket$packet(0x11, 0x3, 0x300) umount2(&(0x7f0000002980)='./file0\x00', 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r4 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002700)=ANY=[@ANYBLOB="3001000010000104000000000400000000000000", @ANYRES32=0x0, @ANYBLOB="202002000a2a04000001128009f00002800600010004000000040004807c0004800c000100040000001f0000000c00010007000000010001130c000100fc030000e43900000c00010008000000090000000600000000000000730c00000c000100e7d10000050000000c000100a3ca206d01eddc1411bfc6d53d564a0000010000000c00010002000080fcfffbff0c00010008000000aea109000c00010009000000bf89000064000380010009000000e52b08000c00010000000000080000000c00010009000000000000800c00010002000000080000000c00010005000000003000000c00010005000800d82e00000c0001010100007c00000000000000004cad00000400000008000500020000000000000000000000001f447c4758158acb569b5cc9924edc93fe37993c278888602fd2b958820b89c0004647b7cc7a952c3d345316849f83b61bb8bfdfa236e18ff7dbe8e89a7118bf88c4b9310fc24d4432e904641c41afa9838585168a4cea9cd811570471d98dcac6e0bb1570b9153960533f8bc25c55f3b07d35c51bc9b4c0fa257e0fcc3a5af33a5ca4f9099a96730c69d92fbc6afa649d4914512b5540da5f3f9d47b4f55e91bfd7c361b10a053a4ce0034eb4b88774df42946f45027aa8e4e4c38ef221acc0f0cb01580e71dc4b1b16101945580f731bab4fbfeb414b7d76c3", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r3, @ANYBLOB="e68d9028d200100000e88cf2fa6a39e3b5c04defd2df4b1399f1a49616b251048a4662ea56b2dcb231564c0a5424a6f5db3a"], 0x130}}, 0x0) recvmsg$can_j1939(r4, &(0x7f00000026c0)={&(0x7f0000000240)=@generic, 0x80, &(0x7f00000025c0)=[{&(0x7f00000002c0)=""/8, 0x8}, {&(0x7f0000000300)=""/198, 0xc6}, {&(0x7f0000000400)=""/177, 0xb1}, {&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/172, 0xac}, {&(0x7f0000001580)=""/13, 0xd}, {&(0x7f00000015c0)=""/4096, 0x1000}], 0x7, &(0x7f0000002600)=""/184, 0xb8}, 0x10040) 06:02:19 executing program 5: read$usbfs(0xffffffffffffffff, 0x0, 0x0) [ 407.139304][T14298] IPVS: ftp: loaded support on port[0] = 21 06:02:19 executing program 4: syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) 06:02:19 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) kcmp(r3, r1, 0x2, r2, r2) [ 407.893126][T14307] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 407.902848][T14307] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.0'. [ 408.080183][T14329] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 408.089710][T14329] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.0'. 06:02:20 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000001180)={0x0, 0x2c, &(0x7f0000001080)=[@in={0x2, 0x4e20, @rand_addr=0x64010101}, @in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f00000011c0)=0x10) 06:02:20 executing program 4: socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_udplite(0xa, 0x2, 0x88) 06:02:20 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, 0x0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, 0x0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, 0x0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(0x0, 0x0) ptrace$getregset(0x4205, r2, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r2, 0x0, 0x2, r1, r1) [ 408.351394][T14331] IPVS: ftp: loaded support on port[0] = 21 06:02:20 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x4) 06:02:21 executing program 5: syz_open_dev$dmmidi(&(0x7f0000000940), 0x0, 0x0) [ 409.289626][T14362] IPVS: ftp: loaded support on port[0] = 21 [ 409.381764][ T2038] block nbd0: Attempted send on invalid socket [ 409.388360][ T2038] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 409.402534][T14364] VFS: could not find a valid V7 on nbd0. [ 409.425193][ T2038] block nbd0: Attempted send on invalid socket [ 409.431566][ T2038] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 409.443022][T14364] VFS: could not find a valid V7 on nbd0. 06:02:21 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) kcmp(r3, r1, 0x2, r2, r2) 06:02:21 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_ADD(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xfffffffffffffe88, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[], 0x28}}, 0x0) 06:02:21 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x30040000}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)=@gettaction={0x50, 0x32, 0x10, 0x70bd2b, 0x25dfdbfd, {}, [@action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8}, @action_gd=@TCA_ACT_TAB={0x2c, 0x1, [{0xc, 0x1a, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0xc, 0xa, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}, {0x10, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'sample\x00'}}]}, @action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0x5}]}, 0x50}, 0x1, 0x0, 0x0, 0x4c000}, 0x8800) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_UDP_CSUM={0x5}]}}}]}, 0x3c}}, 0x0) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x25dfdbfb, 0x40000000}, 0xc) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) 06:02:22 executing program 2: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) ptrace$getregset(0x4205, r2, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r2, r0, 0x2, r1, r1) [ 410.283133][T14393] IPVS: ftp: loaded support on port[0] = 21 [ 410.364748][ T2038] block nbd0: Attempted send on invalid socket [ 410.371060][ T2038] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 06:02:22 executing program 5: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x400000, 0x0) [ 410.417317][T14394] VFS: could not find a valid V7 on nbd0. [ 410.573842][T14399] IPVS: ftp: loaded support on port[0] = 21 06:02:22 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f00000000c0)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='pstore\x00', 0x100000, 0x0) 06:02:22 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000001180)={0x0, 0x5c, &(0x7f0000001080)=[@in={0x2, 0x4e20, @rand_addr=0x64010101}, @in6={0xa, 0x0, 0x0, @private0, 0xfffffff7}, @in={0x2, 0x0, @remote}, @in={0x2, 0x0, @dev}, @in={0x2, 0x0, @multicast2}]}, &(0x7f00000011c0)=0x10) 06:02:23 executing program 2: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) ptrace$getregset(0x4205, r2, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r2, r0, 0x2, r1, r1) 06:02:23 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req={0x0, 0x0, 0x0, 0x2}, 0x10) 06:02:23 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, 0x0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, 0x0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, 0x0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(0x0, 0x0) kcmp(r2, 0x0, 0x2, r1, r1) 06:02:23 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2f6465762f6e62641000"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) 06:02:23 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) [ 411.876078][T14453] IPVS: ftp: loaded support on port[0] = 21 [ 412.063015][T14458] IPVS: ftp: loaded support on port[0] = 21 06:02:24 executing program 5: syz_usb_connect$cdc_ncm(0x3, 0x72, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x10, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x60, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x4}]}}}}}]}}, 0x0) 06:02:24 executing program 4: socketpair(0x10, 0x3, 0xfb, &(0x7f0000000040)) 06:02:24 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2f6465e3000000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) 06:02:25 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, 0x0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, 0x0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, 0x0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(0x0, 0x0) kcmp(r2, 0x0, 0x2, r1, r1) 06:02:25 executing program 2: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) ptrace$getregset(0x4205, r2, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r2, r0, 0x2, r1, r1) 06:02:25 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2f000000001d"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) 06:02:25 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, 0x0, 0x0) [ 413.591707][T14515] IPVS: ftp: loaded support on port[0] = 21 [ 413.811250][T14518] IPVS: ftp: loaded support on port[0] = 21 [ 413.812439][ T5] usb 6-1: new high-speed USB device number 2 using dummy_hcd [ 414.135907][ T5] usb 6-1: Using ep0 maxpacket: 16 [ 414.253853][ T5] usb 6-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 414.265251][ T5] usb 6-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 414.275445][ T5] usb 6-1: config 1 interface 1 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 [ 414.285725][ T5] usb 6-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 0 [ 414.295941][ T5] usb 6-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 [ 414.306555][ T5] usb 6-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 0 06:02:26 executing program 2: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:02:26 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000a40), 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000300), r0) 06:02:26 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x103000, &(0x7f0000000200)={[{@huge_always}, {@huge_never}], [{@smackfshat={'smackfshat', 0x3d, '/dev/nbd'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@audit}, {@func={'func', 0x3d, 'POLICY_CHECK'}}, {@smackfsdef={'smackfsdef', 0x3d, 'v7\x00'}}]}) 06:02:26 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, 0x0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, 0x0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, 0x0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(0x0, 0x0) kcmp(r2, 0x0, 0x2, r1, r1) [ 414.782415][T14570] IPVS: ftp: loaded support on port[0] = 21 [ 414.786256][ T5] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 414.798557][ T5] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 414.807150][ T5] usb 6-1: Product: syz [ 414.811577][ T5] usb 6-1: Manufacturer: syz [ 414.817897][ T5] usb 6-1: SerialNumber: syz [ 415.074315][ T1988] block nbd0: Attempted send on invalid socket [ 415.080707][ T1988] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 06:02:27 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000100)={0x0, 0x0, 0x80, 0xffffffff}, 0x10) [ 415.147825][T14583] VFS: could not find a valid V7 on nbd0. [ 415.392760][T14590] IPVS: ftp: loaded support on port[0] = 21 06:02:27 executing program 5: r0 = socket(0x18, 0x0, 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, 0x0, 0x0) 06:02:27 executing program 2: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:02:27 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000000180)=0x101, 0x4) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e25, 0x0, @empty}, 0x1c) getpeername$inet6(r1, 0x0, &(0x7f0000000140)) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) sendto$inet6(r0, &(0x7f0000000200)="34a1a2f1caecc7141c10d699e6644c4ed8f90434d736014c47c714bc444dd86c06b34349c08dfff75b46d710419d644dd01a405c5f9e18208d79162eaca4a9a7c8ab1e201e5f88fdf9699100940fb302c4107992ab24cccf9a249892f4dcf089ab4623d47ef807f26a1a66d91cce21a1428223827569681d92a43ef1930d4b7e13b5c832fe755ffa59a0c69665af31b759a872a9bdc9a53e789e1363de1efee5aa2209742529179873aaef19ba3e71d4c5cf5718d62a543ad6cce51bf3ae94c5ce3debd89546adccf29434f4810b34c332875bbcf6bd3e3019b77b6feafaa900ff8e1f8d69cd38ea80f8e8020adaa8ea52be2fe914c6aff672a30584217c9ca4d2439963234d378fdf8fe0fac9fd49d8ef9778804e6d879d7364ab7c47d0d638df718d818c833dffb24ca65e8b05ad041f2dbaadbc61ce3980de3f796530c6f194ad365965e191381055e3b5f1dfaeae1ed0c8c03b1a3b3f1cc226b319d59dc894f761c6ffa1a26dc011ca6e7d027642a03bdf5dc15f524f26faf909f4ea978bd88f166ec55e00bbec0a3c35e000292bd0fd467a911fd4d7e67115a1d0973a02ffa5201dc7f29dd446eac67b46c3b727c138d54517cea230517f1ce8843cee63d83d86cad1e289e1b396d45c1296e01339424bd6077d8ddbd21539bf9b7878b0fdfdf199d7c600a1987c96c25b63487890e7dc9aa7d120bbec11487e2fdc8619e5e05402dcc265eccb98c3d25eaf738a4362e0d02b18248ccb536674f5ab1be449b4d08afae3538ca269d98f216a5a4fb8356ecb5fc71f809ecb837142531f3d0de8f8b34fea08e14086dd4ee642bd7fa9fb5ced2a55c849241136c69810a9e24fc1c293ad022f5850f25b0c17662475c2992c39fd00eeea35d4ce0ebc556e7cf6e485a0eac056ae95fd0a3aa6583868a518ec760cde7f8e350339e8d989a7f1d7ee1e65d9191dce417771aab18499ff137937cb4294c137f9de7cba57364d636de50d533d1ec10d4bb75939b7a5de30e6fbc0fb3439001c86f188676a5d15f4c802744a4c6677e67c98ab9e6fcc30d15870a6af637d05793facdf74e15a49f39b9a5c01c4be6a9365db2a02bda1b04ce93cf92b2d31fd3cb9b1b3b681f37542c82f3b7616d9e516210047e880296e4e6ba470c64838146d441ed9c389ca6a5aded8c3d89997b19f7987cd8e4bea3d71fc3dd20c79fee17a85460affcb83e690c2435e803b62e4a8d8040cffc4e2e9997ac841100034a0a2bcfb6fa3dcee9f03e7501ab9bd3a00a136dc335a14695a8eaab0914101b9fad78dd4776f6a6d49cc15db7151579d1690e318b92ac88837c6c19faf5a8015593990672a8b7f4e4d2ef77440366de4018248c34dfabccd79ee9f4d43ceb3906ee70744c14d234e31b6c0fd6a865a34f5ec26c32768679388e5f20f7c0569213e5e57923a7c36aacf3077798d6da100524b630527263899810b2b70df73d067efbc1382c4ae3fab0489896f07ca0db613b0d28d0dc64d6206af85130642f4a4b4b72c5ac0e361f8da6b4b5c3e488c49daade9dae03427d143fa42ba736aaab9529eb1c106fd6ad20423525140afcfdfebad13481869af3f0e2af2a3138a9860efb0fb3f7901aae0c6324d4a523cf453c0420c968b900d373d5739551b7a80dcbb9e6cb94d76ad33a76777a264e12c099a3a5d6a235db228ecf3c871c99ca71fe73ba219de513b726a868784325c5daf6ea92cec7442f1a3c40fc723ae3d375bce365717d1094f2b4a70d224ed2e8f093e03e5127f67a65cb7d6cfac737664dac22af060ac00f10f8460d41074561f87ef7fd6c93ceb00cfa9e2aaae44cf0163384b29e0c07e5d85fceff139c41d9291743a736cbb7b541edceb844a6b3b030dd29aa15bf577236256cfb1f95d52a96c8a3050d7f930b091ca33dbf20ca2c591c21959c84ec18e71c4de949ebc3729144cb879dcc4c49e1a1eed604b7c6de0cc1ba55ec7ff9a5c2482d6592e1a2a637e7710b14328f92b192e31d7be109a7409c00461e559145a78921b30fc2eb511327c342639479960eaa4a4a449afdee00e8420816869eee099b8af3626f105fe8cc7c040ae18a333240be54fc9943290fd522ba59b8f513090a7ab60e2dc6b7837fc05138a71e573aab9f4216366efe789e0cbd75c82ead5f028ccb241fecb147b6aa642aa8a748829d546ff836bf46c79c07fe70054bb3a4dfda157eae5b1b403e5810e77da7c4cd7749b3c340777ad00787c7f34badfca85d59ce8efd0c670f8faf95dc8c35c0aac4848de2effc773e7cae2c28b542fda80c141ac695fada317dc251f80ee865a0f7cf04e74128c9e18d0603b3d8b0370a3a3a85d67168924f47cee326b8d4cfc62d307e960700ece1836a36b722689f205857a8e15069de44eb6aade411981e69d73d4d6a367d86e64d02ef62c37b16b650ef6f5e5f97ebdcbbb97699ad1192deec4ab5349b18a65ee3cc3ffb9b0c383f957592fa105898551405ec2312b9d896ee8e0017b5d5d4733d669be60001e181b113097854593f981c43e36fbb93513c2e3f13e7bdda5eafbb60dbf20fbc5e6f3b05cca31e0c8a3db23ed6c5b43465ffe5dc5c405281d0d833a3c98e0812aa7974746c02a629781ec045e8efe9c603b815ca4495b6535a03323eb5909c9b56b8f0c1c5953841f4e6266a0abfe7654ff84626cf0f0396110db630606dfff4c0c57fe6d291292a51e135344ccf7b9e0224c8e28f3c9a31a97f68e1e4927e2b0af5232850147b2197a5848877b65a2d71bbc38616c9ab7cc2fa6680f722d03a8f2ab7c087392db90edbb1d4a0abaf0d6cc8a536e427252da4ad870195e68342d3db0c41ed96d731409dcfeee0627b3dbdcb12b2e17403c79924656a1441b4586161b8a18dd2f306f90c468fca306f96109bdc0b67a466425a27da145a7a0e99acecc7219173080dc31b2bcf6bbd8c32feaf2d9ff255f6370c6f507c988fbac73d607a9bda8a171a0540a884dc709c5f4d4618c68aa271a4a2061b8dcba11e97250644d0ee547277ab00bd96595e47e52de41d50ba0c447f1990fe24da100bab1a2fc25ba56d6a2ee65f65c717ee05c4c2380f33ba2318a3fa6968fd27986d68366f7e97618c48f131392f0ebe70c84ed5cf79a10b3000f2600453a0b12cf957c57ddfee4cacc475ae40ccc889061b35eb76e9bca7c861e79a8be1b598896be60797033b1d559fc76cec6c7a385ecb5319011b7ae7e4a7c412c3f7f6a602db1a5e1612bb9441ede20c848f035e35e9d2c2389f060bc44089fd360f25e29dab865c617b4b59b74c421f15d150ae078b917889377c563c9bbe5ca6e75bbb06b9c4729414c09a12be8e9c20754c9fab39935e2bfe7ab3905ffb9d42b7346adc727de10e59223eeefbb13cbe49feed77346fc3434558c8ac3ed12756718998691aa65468f9da03d808debccbcfc4ea9e4461aafffc2e9bf7ff3af719f33f452ff0a03e36ac6b46505c80b2caaf51ed116e71205c29b32d27df93046367d4af5b1c2f07c6914f36438205d8967e5e60a89249400b949eed5042e58364713d2678faec0b6b6dcc5dd0e2b3d8dfb03e7504176e0ad0899267a7873936d5ce510cb679c6483c396b8f63063f69975c6fbcf0204cc6219c39853fbeb0ec731586362e7068fd89f9163f297d5f65af1abfd191ab185f01a85f728ee4e0efa6277747314a6f6c74db15133d6ddc4c2c95d7be3634778f854706349dda57a3018a898e5403aaf516cd7c5db6a748f7d3d28164da729319cd09c0c6952155d916d2a468ec00d15c8a64e6dbc0b9f1fc4315dd4714ac094571f8ec3ffa1f153e0d386854a55581d2159bc6a8b312047b9f9ecfafe18f4de646fd370db7f4fe96ce486af2fba88377652d1817afaf7a93b1f9b122e7303a1315174b5b8ab29b96d6bb586e6c53ac6912574a0c477f2934f92b991b2c3dbd140a9f17ff7684ed1d41cce7c6e26c5dcd7967fb1eb098c87255d48cc1d5055f95c1ed449b90557643bd481d8ca647f5ba961fe8e649b56d01a93b9e8c51546befe746a0dea11107db4754b3393d77b2bf624cb5b5024641cd5c105fc60284537077ffc309baf180a044133bda8940928da240db48228fe6dc3214d8cf6826c5e3841cc9409e30948f06f9b51f1060def48508638812e7406bba6780abf47d896a8406cb13677f16a8d3aed0e400d91e9d6a3282feee78bb35b359d8039e48b3adc0904f5708aeaf4732d3f9ac126f604c4f793c26096931bce0cd25d2276b7bd6ccbdf5b44670c6d1054b822a3d8d84a30cff1b2354596f5766aba5e6a2de0eac5530f341fb826633282870c90bdc7bf3c075d5785bf737a7cc93b9f935538ca9f73c9522fe43ad2bda2a83d7ddf40d16271123881d962e0cb21ba8c62eef98015f24fd39292f48c182d66217773d6fc74db39481c154e9e79b75d9b7409b728338f4a45d4c4b7d279bad2d164fc8dc9fa9e37f261ffa6b180ca3c02c0ad616b429dbc61b06e36c59f1b84af74fd1145fec9a5bf2bded9643a9b6cb56ca28bfd0ace47ae26cf3c6f68321bec1f663e9fe35a929f87143bb333ebb6d1718786893e4707720d9362bbcb03ce82c17394dda6b4cedf60e41a67329b438d41ea5792d56104fc1575f32489f853601e308b8064ba399b66e487d19f6e292a6c636d3069be93f153279977c9fcef05b4c34a014382be9b653fffe05c1f7c8524859c2c2e0f7839d7d5a8e05e02786b5a1b8daf1d70f4434c278e76f259b5d6b181807222d726cbe3aa93d04b80a7a1519cb48aa68993144b8525431fd2bf19e5534416a6665b30b06be722ba4734cbc239e68fbfb341364f604bdd30c186ef21b9f6eae8cee7f1f7b863e28601a3076740080bcd402b21fc073e505959034ac5babb10b968d78fd13c5c8ed985cf008ce7cd8122d52998d28bec11316e2e7b15659d461fe08a2d4fa01e3ff566a85f667aaf60ae4cfb8a9a0b0126dc1890c5042dd1cc1e7348d8c3692d0bd7cdec35934fdaa0e35b99852b8a7caecb020313a8f6c634c0d06b6f12574e150b8d7c6937fd4d44d492ed82d9dedaf4ac667d28ea40fd270a48782e264f34720d9cb93eac1b896123c1d2d8cf6bf077ed31609ae112d9f97afccc39ab58949fcaaa7b58af89cbb04214895c1079a00a3a06df12ce31867adeb5bdb2cc72e858c5a7de50d6ad12801e03bee0f023e663ecf6e7c720fb0486028805701a89330880d8ff04ce628a585bfb0669cb5a982e04408e05f560c01dfe1d14beb3f094567ebf7a7bbd9bb62febf2b0f4a520dad54637204309441001116c1bfe5c8a5d65cc033f9378a22f98e456d2eb2df5519f0a3269690cc7e6f1fe6badabf8d1d1a14161c804c21573cf96c43374b79dcd67a6438359d81f4de46e2b09c05467fae5e1e6ee2279e796aa8e526ff3834e0b8200c15eeef0be878c8bdb05fb163b9aa5f87ae83e9b7e1da4dcd928d81341b6660e512afb2903ae5ec227bee74ec38f7a6f41927eca6d923db4b497331d322a340df4d5e8bc1cba346ed505dd83aaf16a06290c93d51933cafc9c5122f2cc534577422d02d572da4190963c95b599044566646141e3aeaa21f7f7cb5297a8ff256236aeb0854fd4ad3081c6e9145e2ae4afabe2dfa2aaea66a691315f43d933b3283ed860ce02b25c96462361608d43941d7b02e37df0d3cfb452a26a5fa7688e2752f2614c6f8c1766cb48c9a390d8d8a1ae39d0a914d2b3322a8caab336222afa45ac8dbe7d252c386e5305b0132ca7ec76430f40a5a16fba98c3dc", 0x1000, 0x801, 0x0, 0x0) r2 = syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) name_to_handle_at(r2, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=@GFS2_SMALL_FH_SIZE={0x10, 0x4, {0x80000001, 0x5, 0x100, 0x2}}, &(0x7f0000000100), 0x1400) [ 415.712784][ T5] cdc_ncm 6-1:1.0: bind() failure [ 415.727597][ T5] cdc_ncm 6-1:1.1: CDC Union missing and no IAD found [ 415.734769][ T5] cdc_ncm 6-1:1.1: bind() failure [ 415.883951][ T5] usb 6-1: USB disconnect, device number 2 06:02:28 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000400), &(0x7f0000000440)=0x10) [ 416.122035][T14634] IPVS: ftp: loaded support on port[0] = 21 [ 416.170205][ T1988] block nbd0: Attempted send on invalid socket [ 416.178096][ T1988] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 416.210059][T14633] VFS: could not find a valid V7 on nbd0. [ 416.321743][ T2038] block nbd0: Attempted send on invalid socket [ 416.328335][ T2038] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 416.357054][T14638] VFS: could not find a valid V7 on nbd0. 06:02:28 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="2f6465762f6e6264300093a28e00e8a821c468a01f36d886669f06176277be883fed6c6c6931d0d046e83f9a478ca1ea75c16a29cff2cbe5b1ec41404c8d34fa87bec3d7c7e8126d354a03a391b95cace971ca725b7c73543b7491a1520e2023aa8b6c4735c18a5d0de50a608ec75c57debb5d9e9dd18451f6d4d3403e1274cb7771273f60e2d0fe4354bca8251dc33076ab2c47cad0de8e5e3a50ff16c2b9f9d663b56865ea8fbeb0112824c81c6344fed22c31f95a068eaf0ee183ec605427148546f02f8b50a7"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2f007c0ec31c019afb"], &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='f2fs\x00', 0x810000, &(0x7f0000000100)='v7\x00') mount(&(0x7f0000000180)=@sr0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='erofs\x00', 0x140408, 0x0) 06:02:28 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:02:28 executing program 2: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:02:29 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0x5460, 0x0) 06:02:29 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 417.310569][ T2038] block nbd0: Attempted send on invalid socket [ 417.317077][ T2038] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 417.367732][T14669] VFS: could not find a valid V7 on nbd0. [ 417.462413][ T2038] block nbd0: Attempted send on invalid socket [ 417.468858][ T2038] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 417.498886][T14669] VFS: could not find a valid V7 on nbd0. 06:02:29 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, &(0x7f0000000100)) [ 417.532498][T14675] IPVS: ftp: loaded support on port[0] = 21 [ 417.565142][T14676] IPVS: ftp: loaded support on port[0] = 21 06:02:29 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)=""/203, 0xcb) mount(&(0x7f00000000c0)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x18000, 0x0) 06:02:30 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:02:30 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:02:30 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:02:30 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000700), 0x10) [ 418.391888][ T2038] block nbd0: Attempted send on invalid socket [ 418.398626][ T2038] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 418.422361][T14729] VFS: could not find a valid V7 on nbd0. [ 418.439785][ T1988] block nbd0: Attempted send on invalid socket [ 418.446563][ T1988] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 418.479053][T14730] IPVS: ftp: loaded support on port[0] = 21 [ 418.484910][T14731] VFS: could not find a valid V7 on nbd0. 06:02:30 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x17e4, 0x0) ioctl$USBDEVFS_GETDRIVER(r0, 0x41045508, 0x0) 06:02:30 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x10, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='binfmt_misc\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file1\x00', 0x10) [ 418.878725][T14749] IPVS: ftp: loaded support on port[0] = 21 06:02:31 executing program 3: r0 = getpid() rt_tgsigqueueinfo(0x0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:02:31 executing program 5: io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x43d49f3a11b7fe44}) 06:02:31 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000080)={0x0, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f0000000140)=0x9c) 06:02:31 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:02:31 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f6465762fd86102a62c00000000000000dbd24358424ac3856a1f06ede1f0373e27205b067f3ff6c8ce38ce9822f4f04a33ce16dd5426a73d8dbe"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) [ 419.909298][T14789] IPVS: ftp: loaded support on port[0] = 21 06:02:32 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x72, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x10, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x60, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd, 0x24, 0xf, 0x1, 0x0, 0x0, 0xfff}, {0x6}, [@mdlm_detail={0x4}]}}}}}]}}, 0x0) [ 420.208136][T14802] IPVS: ftp: loaded support on port[0] = 21 06:02:32 executing program 4: add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)='f', 0x1, 0xfffffffffffffffe) 06:02:32 executing program 3: r0 = getpid() rt_tgsigqueueinfo(0x0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:02:32 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)=@md5={0x1, "144c7f280b744f5351497cb5b7946915"}, 0x11, 0x2) lsetxattr$trusted_overlay_origin(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200), &(0x7f0000000240), 0x2, 0x3) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="2f6465762f06622d8f4242ec9df38743b95a5339087cfd5e81baf00a22df1cb3ac56db824ccb44a7f2f115e1eef7670a83059630e5f85e0b8654dbbb6126c2f6e62576d5aaeb82bd7a011e92319ae37aaec031fd99b787aebe89f1ad73112c11ae47b148afbafedab30afe46ac207ffee3ec3ca50179594bc8"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) 06:02:33 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) [ 421.003062][ T5] usb 6-1: new high-speed USB device number 3 using dummy_hcd [ 421.146043][T14848] IPVS: ftp: loaded support on port[0] = 21 [ 421.242495][ T5] usb 6-1: Using ep0 maxpacket: 16 [ 421.405614][ T5] usb 6-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 421.416882][ T5] usb 6-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 421.427170][ T5] usb 6-1: config 1 interface 1 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 [ 421.437439][ T5] usb 6-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 0 06:02:33 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000140)={0x0}) [ 421.447560][ T5] usb 6-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 [ 421.457581][ T5] usb 6-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 0 [ 421.632032][T14874] IPVS: ftp: loaded support on port[0] = 21 06:02:33 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000200)=""/181, 0xfe0c}, {&(0x7f0000000100), 0xffffffffffffff62}, {&(0x7f00000000c0)=""/51, 0x33}, {&(0x7f00000002c0)=""/183, 0xb7}], 0x4, 0x3f, 0x8000101) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000180), &(0x7f00000001c0)=0x8) mkdir(&(0x7f0000000040)='./file0\x00', 0x10b) creat(&(0x7f0000000100)='./file0/file0\x00', 0x15b) [ 421.923251][ T5] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 421.932648][ T5] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 421.940872][ T5] usb 6-1: Product: syz [ 421.945405][ T5] usb 6-1: Manufacturer: syz [ 421.950204][ T5] usb 6-1: SerialNumber: syz 06:02:34 executing program 3: r0 = getpid() rt_tgsigqueueinfo(0x0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:02:34 executing program 4: openat$uhid(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) [ 422.378701][ T2038] block nbd0: Attempted send on invalid socket [ 422.385285][ T2038] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 422.412718][T14905] VFS: could not find a valid V7 on nbd0. 06:02:34 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:02:34 executing program 5: select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x77359400}) [ 422.637759][ T5] cdc_ncm 6-1:1.0: bind() failure [ 422.652787][ T5] cdc_ncm 6-1:1.1: CDC Union missing and no IAD found [ 422.659858][ T5] cdc_ncm 6-1:1.1: bind() failure [ 422.743240][T14912] IPVS: ftp: loaded support on port[0] = 21 06:02:34 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f6465762f6e62e13000927a7ca33ead0a625ce281ddd68875274b43"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') [ 422.969409][ T5] usb 6-1: USB disconnect, device number 3 06:02:35 executing program 4: io_uring_setup(0x5013, &(0x7f00000001c0)={0x0, 0x0, 0x8}) 06:02:35 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, 0x0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:02:35 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000780)={'ip6gre0\x00', 0x0}) 06:02:35 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000000180)=0x101, 0x4) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e25, 0x0, @empty}, 0x1c) getpeername$inet6(r1, 0x0, &(0x7f0000000140)) name_to_handle_at(r1, &(0x7f0000000040)='./file0/../file0\x00', &(0x7f00000000c0)=@ceph_nfs_snapfh={0x1c, 0x4e, {0x0, 0xedc2, 0x9, 0x7}}, &(0x7f0000000100), 0x0) 06:02:36 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:02:36 executing program 5: syz_open_dev$I2C(&(0x7f0000000000), 0x0, 0x400000) 06:02:36 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, 0x0, &(0x7f0000000980)) 06:02:36 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$udf(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x7ff, 0x4, &(0x7f0000000100)=[{&(0x7f0000000200)="76fcfc15ccb7a3870fcd912046f3e3877ae71b41bb25682f6d3e77cef10091a89773d25f1677fc234b59f226c1b18972c7f5d801b26f858e384f373af7867a3f5a6df0865eee4f027af214cb20db2e062f1355", 0x53, 0x7}, {&(0x7f0000000280)="a8ab835c4320b3136a73fd8d125c06df0095d4048c80d08400b4a77bf368b48310e730e977305b1ee4a35582111a13b59d659d68b1f11a0d2a49524db32a11b25fb3a1734d33b4b0a2f9a0b638bad8bd8d5839397e7c43e4be6adf3261762696977df225ef871e4b9336be567dda32f8c0601ef09b22f6618893f448aed7072333b3932df55883eca1979c0bf07a06b7f2f9c560329299eb2fb8ed1f0011aaf05ea710dfe5109479933860847818c2d5f1dca950ec0dd2285de4698d4d2db7530451b13146036b43573608c2786f90f8877460f3358a8e11638c32832d71ae9402ca7f23b15427aeeffad6082c40a6", 0xef, 0x5a7}, {&(0x7f0000000380)="f89a3524a0c3a652fc36f24d748a29987301d0fb34780f5bb7b44b5514d0f010615db67485299d7b088a3b8633cc29417c398e81b254fdc1b18629274d2945b0c97403f102d70315ddbb758ee0adee7960d3bd99de0b", 0x56, 0xe259}, {&(0x7f0000000400)="bbabdfdc544bd3dc23f3c24a087bce766511bc8af68fc40521fc249be5a03678a6f9597f98003f7aa26f282ba360dc1320e6caf1568fcb1c55c4e23144dafb1b7293cc5f108d2eb174fa5fd0bdf42565a52cdfa3d3707617ffc498746915f77921a52b7a897e56e8e5b6d53ce0f6e9ae66cc4d77a3df9c22c11d4d72dc9e131abdd0a98df62fcd5818c90ca8a4830fa81e181ffc947ab718b6043882216675807d32ca622b4960360271deaadfdfa423b03ebc346e55c699ef1979c85ca66a53996aff6972f0dd4db745f3ed87a34f26d959d9bfde1cc33dba14ad4d28a52bf3ecbe1cba018b38b838006981bb1acb0fb7c4066bf5eccf35b8ea7bbdf30375e57ce28bc5ceb4774f1242cfac51ae22f38fce08e6bc54e1a7e1b07392ce092f75f25979710e0777f5ef982c80baca448cfab8146c343566dde253604239cdaa2e60d410dba3b6436d90a3f896e1e6d49bd2ab4ea41d9de668eaf277a2b47b5e059806a2063a6bed693dee4bb6c0fd4cb5d09f7f5e7249df74d981d9cc9d6889ddf614a3559ad6922f4fb775d05e7e35b026ae4aaf45e92993b84b5ca593d43cfdc81f29caedf221c8f89b14ccfcb49fd605f64b8c381d250987ef7eb1d23cc30eb1fd6b748873a677ca351de50bb3dd721612d98f62fa643e40edd082feeb3082a907ca8853e0e642606c69d5fc17a001fc18fec31abfe608436ce34c1011126644dc64ca1148e80528065e06e68c7677b5781604d5296b2b9a67569f9c621080a903533184385d6be367e340bb10856804740bce6fcfb8fd1e16e656c66b93b990ecbbeb704912215370340e30b32d7decf9b31ca76f6c421c89e13c46d6e89047b187a2f0f179095bac3d7f1d82f2c41755919895ff700f65628a3157f675f2af291e175fb2c481e301ad7d2d7a7baac4c106fae466f3e8f431e8b9ab5a99a743f20e5a3d739b9d8e171b199ab93ae129a7c3fd3a630a208c90107ee2f32ec07b3170d50b8e060bc05c2c5ea7bcea29dbfe740e532495689518a8f9841fce9a42c09fd0be30527d084c9675050e944e9ac8035f020bf99d4799ee8a3b72981d34c77a2a0d7bf6e97a2216c32cb534c2a40110d31fd8e1d81fa2cebbac51e010e1b5e188f5b37623718e55de43ec88ead983c3324e4875177f90b50be5e7047227212e0c59a888f0fe8798a170917a4b7d9657b0d7407fcb0bce2d2711a698a96078bf81d01ebe7e85ec3533eb69c9775e4f9844f6d1995bbacf3e0c894df8e41d91c69f9f0cf45fa892e245fb9c826faac396534dc590a6d54444e64ad7a9dc7ed59daab128d3848becc8c9a07ff66b5291972cf723db859005bad095f9bed2e8ccadfd6828cc480fd847d07c2ea9fe60fb8fe21fea02df8d9a28cac7319ae13e7f530fe5e554e51f0ae90777b9cff4498d70e4bae7c40bc864f22a49420b5c6ec393f15224d3f1395c65eb3fda489d137f54b34833857dd8f9d4e9ffefc4e5c010759846c650ac0e3c87d96f8ac3f623bb4443835af2b611411053ca736e31f1a40b1713358bd683e866b12386e9008a25e549cc40b1cb5de2d4a9b383f7bf27e26069f8c045a7d16ad514b4881e4e22767d95aa3c4a59e6dc8cd295fce9737bb2811c7c543d7cc29d0ffa1c0fb6fc58285f366f580a13768ee8a8b08f55125b65af069c5fe7e3170952759a785596d531f145191d6bf00d6c290ea088103d1dda33871e712d3632cd85d85287bdd5277a6443fdd83732aa9a099ec7f12059277f13ee95e36ce6e13a17554443db5ea345793875d9cd481608c49461116113e657e7ad5755855223e47d8ce38323350331c0cd545d445f8249db48de6d9bc4ce83545f414e3f45da04587ca5ea199fe4351fc8bddb2ee5c5b6360cf93d2506b6c28c0373d5d7fa02a8b616625ec208faf5030e220cd2d26f7273a123bba31dc80550f2c4c3292bee73a5005fe8459cc037b58041da99644a9f2582659499000303ff72482160bce73bbbcfbe1de6c2f63ee4d064f26cbd0d78a8f5e22081dd1d8635b8def748099b0f30583a2adad3a9b31687461c2bf3b24531641b3222b50e95b2c264d89bf0dc439f15776aff6e8db51f2a59b7cce70671da0e264a6cdb66ee190350f138e0c48ddf043b4a61cb1dbdd260b4258a412a2621622dee1f593341ef2a61495d5935dfd16414577cb4a47e84ded132db1558deb41286a2560c01b12f29f621a55438c91a5776886bfbbf5e66734a432ecce003ce20ad40cc581e384405ae11c04ef0aebdaec5c8316e9326a746ea37e1a05ff5d200586eba30cc8de65632f5fd0b2fd55eb27c6c59b79c1cb8982649410225c35da5f023ce06ac35cffb469187a7a1d279950c298abcbb474782cc3bd772fef88f85422c4fd8670255f705efc8f0a5742acc7bcb210c0302cf02f98fc3a5eb6fb9e3dc32e901b60a1d0f478cc4fd5d875ae5ec3980442b8c2a5dfeae3281cd6915341160de7a200fd29b7f96348f84156cf61ddd47c403c524885c5a05af6eac369094915cbd31ccc46ec09b08a24a7d9bbbda8284f58b25860948cc3a6bc65fed72ec2495998fd805a250ff690ee2ddb6079a43777e8666f42c012e544fee4168e14896e1927ad24dfc56b6291007f7581363889e709d9871bade7b5ad756b4431fbf27dc18c67bd4ff9b6f8a0485dd81b6847ca3be628c5b3bb3775580550b1e3c201730283bf17cfae7668f1b077d3f038f09c2b23bcbfd8cd774774c5ed7de72d23130417f484abb58a435da1ab50ff1e304354acd6b117703d7c2386219154d881fe8e91154f594c523bbb119906f18cc22cea9386b8a5eeae1f10e9c8309bf79853983472afe737e5f6a19bd8838d452f723d5b905df378deb5342072d0b4e179eba644b397e037fa463a0bf9e0570ba6e64067048540b8beb8ebae77ce1b7eefc37928b3ee7eae2e3bd17ae657565ddec93224fae035f5a1ce66f7fbdebdd52061ede6c9f6a441e3a0e18ddce46a32baa62fe504d320121e1f854362859850183e2d2b18dc3d2033cd590b6281858763bdb80964a5aa5327684e2e23aef0858da88a56f91b5525d58cb8d49706294c58b13f087a264c73d15326f1ed59dec435c62e1eb80d1ab9e98c267fb1c85a43b04a0c467268e35f3394595cfedb5675f9d3501d7b4c1436d01e3f20ec1cc91bae1d78506caed1bdd0625e1747735603b9a287bdf0867d0f0718992e0161815e90442f5cb8eaccbae56d168124d0d7b01a1d08bd70efce42656dbf9b631fa871a38aabe661b3c7893434a4e0f7882e2a2a46f1a118d579c974fe8ec424161cef16e40621eb59ce69914658a80c49a86c6bb67b431214a82f58fac6b85ecb309ba99cb22a49128c69f23e97cc5135eda34886793cb14bcf29c2a8343d1d2e4340886796df737960b9e3ea89bf0a49a057d0bd56b599cedaaa49c8467c099428a4bd0580e0b64beb780b1a8baceb251ab2ba61e8ec2d49ebb7e67263a6777e90175e2cc00795c3aaf27f86f181b3e3b45cb171c663f3c262aa57d3dcb7251a339e4035c978e33f074bac28139fd2cfdeca9ea0a127783c4d4816d222c5eb47ac569fe4d6346dd953f4567bde769be89eb471945c13e154a0470e430ec1e213ef18036eb9ef7e88600bce98e3e13cc7f82a70322bc125baf019b4ff464df7f914e04714ea8869bec427d885d85704b01db532bf2888d1d291a45042d2313b899ec7eea9020b91058d76d49d1b499913bcba875fe165c2295a86a03c3a81bcb841948998fd8dc201f47de2be56bbfb389d2303f1904acde2279ef5b555701650a78f1112e24195dfc47c78b0b0425ab7695906aaec5ae76a9ddf28eca858815567d558da56edbf5d5bf9d76bb5c62c1fdeb8557b47d8d3c2e3eecfd8926403497b181a798b3b199e258a12a6020056259fc146ca9cb2944854ecd8650cba95fc0c278bdda91b4dc4a02eab4dd4002fca0be22ccdf38e3188833d708cfb803ef62c4efe7ddade8cd4b3d3eb67900d9d3899e8fb537c352b82cf3019fdc9dffdf5e3a637e88298600778d08c03069db15dfcde82cec2db1ee6cddb3061a3d9c8961eadf9521bd173ae9d870166d407021349a8e4e76682eb6f47f2d484388e69319550452346431989a28ebb551d3219dad27bdb8b4a06533bcb696c71827ac20817b4171a238ba48c4bc8d55e6d51b9becd13458c55f4663dff2d773f791f1d8b5312f5b8d5257d73c4901dc0b8f98e7ef8b06bc21718297e872ea20b98c2f47f50571fec4abb52447cd7c949879cbdb3a14bd5613f2509e4487f4269220b948eca5cc6d7bb530e8fb06ff75401f7efa0beb69964b9d655297c86910ee44b8ecfe15a0eecc58951ec7b02c4621ebf73f352edc0c4e1ce90ef7f0bb7c81ec517d0d6da2eb4dc6f7432de6b583d8d9c9fccb08246e90ffac4bd4f9fa2bed8f1d56da49cb3590330b462db24571ee84fc2574a90324575fd3613f5abca1028b61af12b4d17aed6d51b4b6b069bc8756556616c058270f46c0e19a3677e0193152b2ebb1980c613a3c5275393ff44d8873adfbd4a633f92f55e3620ac1bb78fa8db5886abbc4797e6f9e3b4d3ba92891222ca45da62d72ea75ed80a74cc584265a1c0038249595fd91a2dfc69ecf8b783fb91a26448a03718ad89d3729d1eb99dfd6542b25eb7a2c4f4ce60c12002bb7cc30dd7d107a332a2bd9c6ee94c9fac834d47860790f0527923b12353f246d5106b5d7836d546c5a95c45cb4adb66d621f8ef1b6d574c0ffb6cb67991b1b9c874eaa7921d94cb7770a7d91fb6c054f81398abf43c5ffff45dbf74dbeaed86cef8cbe14fd15ab6e734b937a04ba1429f2745eea6490e0d23f2c1f9e7d1036a1dc5fea4ea169093d40257da7b85045598635b3a0793ee1509647386ea3f6a84af446327fd3dd853a1228a82f29405a32e912d598da6ac7f110693fbbd3202efbe81bc25016b9312da834641e69967f310e243c82a8b0da92a38310156c5c9e98a6c30844bef0d936fb314d59758db6f73899c0345b97e6c2bdb94f952a8c10a60735cba78884eb4bc1902f3ebe7f0a921c9081610cd89dcc8a016722c7ca9f5993af24607e1d9b8087bf7aadfc56f8b19c99fbba49823200227edd91d8494630383d59a3ae0ce867119efb525cbfad3b56cf3b50458e5501e75f06839170ad24cd7c447629da119c649773c0b6cf9c1c24dc8ad4b5ebe20403911344a74adbff2131a98cc670defdbb4e231059f99222f2596c57f08db7cf358353645d3b281e238301bbc5e7cfe1fce11b3169cfe437684a217b4b096db84558555a749a2ede2e0e867e9bffc226c571a899787423ba5d982e762191a69e7e5deb1587261dd587753afcdad0bf2152851d468d4c75cfeb59afb9dcca5113724da787986adb3f6ae69495da8f901618a11c5956e6040a34bdbd36634dfd6abb5fcc7d7a67a89bb54834de083a4a884278810e6f8d4fc6b4b0b05c8514b298112a9e414bcce171f155b321ffd385a38bfa1c14baa935df0f0e9285c99a8715b65d8507655cea640786adb860bfc17f2cc126f4185b6b7559a2f4a5f038df382fa0aaa9ffdb3cee23dab30e420a583c99c7edc7f25db83d1fb0225f623b31deb487b5bd2b759619719dd28d313d442ed9b2154ed1638aaa57ae424481c4e714bdf42edadf413bd4c3275f1e91f778e103d9d3591489c420538df8eb0f7cd10153e41026aaae16001947e6cfe02acfe6c4fb05a365cd7fa40b3a15b43bbc2055688af4c13c35966a161dd982976105643c", 0x1000, 0x6}], 0x11000, &(0x7f0000001400)={[{@session={'session', 0x3d, 0x400}}, {@longad}, {@nostrict}, {@utf8}, {@nostrict}, {@gid={'gid', 0x3d, 0xffffffffffffffff}}, {@rootdir={'rootdir', 0x3d, 0x4}}, {@mode={'mode', 0x3d, 0x4}}, {@session={'session', 0x3d, 0x4}}, {@iocharset={'iocharset', 0x3d, 'utf8'}}], [{@measure}]}) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0xc410, 0x0) 06:02:36 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000100)=@assoc_value, 0x8) [ 424.892772][ T5] Bluetooth: hci4: command 0x0406 tx timeout [ 425.036218][T14971] loop0: detected capacity change from 0 to 226 [ 425.545370][T14945] IPVS: ftp: loaded support on port[0] = 21 [ 425.561410][ T2038] block nbd0: Attempted send on invalid socket [ 425.565047][T14956] IPVS: ftp: loaded support on port[0] = 21 [ 425.567817][ T2038] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 425.585433][T14977] VFS: could not find a valid V7 on nbd0. [ 425.624120][ T1988] block nbd0: Attempted send on invalid socket [ 425.630522][ T1988] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 425.647143][T14977] VFS: could not find a valid V7 on nbd0. 06:02:38 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:02:38 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000), 0x4) 06:02:38 executing program 5: r0 = openat$mice(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) read$qrtrtun(r0, &(0x7f0000000800)=""/4095, 0xfffffffffffffcdb) 06:02:38 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000200)=ANY=[@ANYBLOB="2fc54691f66e6264b4e594e3eebeb7b5ff257d0373c28bb867f8aa4da6fff78cd9871e94fc90740a7abb7759c611388df17b7953d16b4ba2427dafd9117cd8b0ece9aced181c863e2b8edf36a6bf7e8858279c246c1f92614cac31b4e5a97c5e60b04efb150a73fb7b73171d7aa4f089e551fc19bf5cee798d4f77f46a1f3cd10959859fd75d97f9"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x1000088, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303030372c6d706f6c3d64656661756c743d72656c61746976653a36012d350b572c689367653d6e657665722c73697a653d74362c66756e633d46494c455f4d4d41502c6d6561737572652c6d6561737572652c00"]) 06:02:38 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, 0x0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) [ 426.301206][T15027] sctp: [Deprecated]: syz-executor.4 (pid 15027) Use of int in max_burst socket option deprecated. [ 426.301206][T15027] Use struct sctp_assoc_value instead [ 426.391234][T15029] tmpfs: Bad value for 'mpol' [ 426.438677][T15030] tmpfs: Bad value for 'mpol' [ 426.444551][T15031] sctp: [Deprecated]: syz-executor.4 (pid 15031) Use of int in max_burst socket option deprecated. [ 426.444551][T15031] Use struct sctp_assoc_value instead [ 426.615900][T15035] IPVS: ftp: loaded support on port[0] = 21 [ 426.664081][T15036] IPVS: ftp: loaded support on port[0] = 21 06:02:38 executing program 0: r0 = syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)=@ceph_nfs_confh={0x10, 0x2, {0x0, 0xfffffffffffffeff}}, &(0x7f0000000100), 0x1000) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2f64a898a65e183a4ce6"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x10c812, 0x0) 06:02:39 executing program 4: keyctl$dh_compute(0x17, &(0x7f0000001a40), 0x0, 0x0, &(0x7f0000001b40)={&(0x7f0000001b00)={'ghash\x00'}}) 06:02:39 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, 0x0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:02:39 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:02:39 executing program 5: syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x20040) [ 427.755550][T15090] IPVS: ftp: loaded support on port[0] = 21 06:02:39 executing program 4: r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x3ff, 0x0) read$qrtrtun(r0, &(0x7f0000000180)=""/161, 0xa1) [ 427.799716][T15091] IPVS: ftp: loaded support on port[0] = 21 06:02:40 executing program 0: r0 = syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r2) fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ocfs2(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x4, 0x3, &(0x7f0000000180)=[{&(0x7f0000000200)="41c41c2a224e9b857b9d58866c234d59347cf8f4082d9bd3dbd5db5b41af2862cea36daa68ead551d14bf32e27bb0e333d03aed77842ae0e1a6f936e7f0e48061eea7b074269ae6a0e93fb7b07a700aee1adbdc026a8761144e6ca941b07f7d4c1ca912052f00e60a1030726a44327e6d223ee2a14aabb9c36fb7330b849f97a66587470041e2cdfbf832d77b62709d1503b083e3c45", 0x96, 0x2}, {&(0x7f00000002c0)="51f54c642a8600d0a39205b729195ffd8f049f5d65c33b3afcd9ab4ebff2a0cf60ecb22add6a0c9d27f048654ea822e945c7c89ccf4addee16b0f88fa140ee94442f5753cd54b2ed2625b04ec260e076d6700a00d0cb8cc64b0818", 0x5b, 0x200}, {&(0x7f0000000100)="805a34410a907b04146820718b1fbd10ce14931e8d6dd8", 0x17, 0x5}], 0x23, &(0x7f00000003c0)={[{}, {':'}, {'v7\x00'}, {'}*'}, {'v7\x00'}, {'v7\x00'}, {'*\v'}], [{@fsuuid={'fsuuid', 0x3d, {[0x64, 0xa8, 0x36, 0x66, 0x57, 0x35, 0x61, 0x34], 0x2d, [0x66, 0x6010f3f054afc244, 0x33, 0x30], 0x2d, [0x31, 0x54, 0x33, 0x56], 0x2d, [0x38, 0x30, 0x31, 0x39], 0x2d, [0x64, 0x38, 0x32, 0x66, 0x62, 0x30, 0x62, 0x31]}}}, {@seclabel}, {@subj_role={'subj_role', 0x3d, 'v7\x00'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', r2}}, {@pcr={'pcr', 0x3d, 0x11}}, {@smackfsdef={'smackfsdef', 0x3d, '%'}}, {@euid_eq={'euid', 0x3d, r3}}]}) 06:02:40 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) connect$packet(r0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) 06:02:40 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x0, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:02:40 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) [ 428.622447][ T2038] block nbd0: Attempted send on invalid socket [ 428.628961][ T2038] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 428.694097][T15142] VFS: could not find a valid V7 on nbd0. [ 428.763908][ T1988] block nbd0: Attempted send on invalid socket [ 428.770297][ T1988] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 428.788814][T15142] VFS: could not find a valid V7 on nbd0. 06:02:40 executing program 4: add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) 06:02:41 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f6465762f6e626430004dac685e29f7e8d04467d4d104f0cef371ed1c6f6f7318b460"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)={'L+', 0xfffffffffffff000}, 0x16, 0x1) [ 429.153306][T15149] IPVS: ftp: loaded support on port[0] = 21 [ 429.263808][T15150] IPVS: ftp: loaded support on port[0] = 21 06:02:41 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000100)=@buf) [ 430.084580][ T1988] block nbd0: Attempted send on invalid socket [ 430.091140][ T1988] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 430.107883][T15201] VFS: could not find a valid V7 on nbd0. 06:02:42 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x0, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:02:42 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111}}, 0x20) [ 430.214654][ T2038] block nbd0: Attempted send on invalid socket [ 430.222386][ T2038] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 430.234936][T15201] VFS: could not find a valid V7 on nbd0. 06:02:42 executing program 5: msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000001180)=""/125) fork() msgget(0x1, 0x0) [ 430.567263][T15205] IPVS: ftp: loaded support on port[0] = 21 06:02:42 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:02:43 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0x400448dd, 0x0) 06:02:43 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x0, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:02:43 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000800), r0) 06:02:43 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) chdir(&(0x7f0000000040)='./file0\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r3) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(r5, 0xee00, 0x0) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(r7, 0xee00, 0x0) r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(r9, 0xee00, 0x0) setxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000200)={{}, {0x1, 0x7}, [{0x2, 0x5, r1}, {0x2, 0x0, r3}], {0x4, 0x2}, [{0x8, 0x4, r5}, {0x8, 0x7, r7}, {0x8, 0x4, r9}], {0x10, 0x3}, {0x20, 0x4}}, 0x4c, 0x2) [ 431.672760][T15238] IPVS: ftp: loaded support on port[0] = 21 [ 432.180454][T15246] IPVS: ftp: loaded support on port[0] = 21 [ 432.252494][ T1988] block nbd0: Attempted send on invalid socket [ 432.261114][ T1988] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 432.283044][T15245] VFS: could not find a valid V7 on nbd0. 06:02:44 executing program 4: socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)) 06:02:44 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000a40), 0x0, 0x0) r1 = socket$l2tp(0x2, 0x2, 0x73) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000200)) 06:02:44 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:02:44 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, 0x0) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:02:44 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r0, 0x107, 0x0, 0x0, &(0x7f0000000180)) 06:02:45 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3}}, 0x0) [ 433.254045][T15302] IPVS: ftp: loaded support on port[0] = 21 [ 433.373885][T15303] IPVS: ftp: loaded support on port[0] = 21 06:02:45 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x7c, &(0x7f00000004c0), &(0x7f0000000500)=0x20) 06:02:45 executing program 0: syz_open_dev$vcsu(&(0x7f0000000000), 0xff, 0x0) 06:02:46 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, 0x0) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:02:46 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000001180)={0x0, 0x10, &(0x7f0000001080)=[@in]}, &(0x7f00000011c0)=0x10) 06:02:46 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, 0x0, &(0x7f0000000440)) 06:02:46 executing program 0: clone3(&(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[0xffffffffffffffff], 0x1}, 0x58) fork() [ 434.797819][T15363] IPVS: ftp: loaded support on port[0] = 21 06:02:47 executing program 4: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:02:47 executing program 5: r0 = epoll_create1(0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0x60000018}) 06:02:49 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:02:49 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, 0x0) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:02:49 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE(r0, 0xc01064c2, &(0x7f0000000000)) 06:02:49 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) 06:02:49 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0x40049409, &(0x7f0000000100)) [ 437.427309][T15415] IPVS: ftp: loaded support on port[0] = 21 06:02:49 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, 0x0, &(0x7f0000000580)) 06:02:49 executing program 4: io_uring_setup(0x5013, &(0x7f00000001c0)={0x0, 0xb950, 0x8}) [ 437.775932][T15441] IPVS: ftp: loaded support on port[0] = 21 06:02:49 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000001800), 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x2010, r0, 0x8000000) 06:02:50 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, 0x0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:02:50 executing program 0: syz_open_dev$audion(&(0x7f0000000000), 0x1, 0x4000) 06:02:50 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) 06:02:50 executing program 4: r0 = epoll_create1(0x0) epoll_wait(r0, &(0x7f0000000180)=[{}], 0x1, 0x229) 06:02:50 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) [ 438.979821][T15473] IPVS: ftp: loaded support on port[0] = 21 06:02:51 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, 0x0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) [ 439.466601][T15504] IPVS: ftp: loaded support on port[0] = 21 06:02:52 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc0189436, &(0x7f0000000100)) [ 440.190557][T15529] IPVS: ftp: loaded support on port[0] = 21 06:02:52 executing program 4: r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, 0x0) 06:02:52 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000009c0)={'sit0\x00', &(0x7f0000000940)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}) 06:02:52 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:02:52 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, 0x0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:02:52 executing program 5: syz_open_dev$audion(&(0x7f0000000000), 0x1, 0x4000) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, 0x0, 0x0) 06:02:53 executing program 4: socketpair(0x26, 0x5, 0x200005, &(0x7f0000000200)) [ 441.189579][T15559] IPVS: ftp: loaded support on port[0] = 21 [ 441.423598][T15565] IPVS: ftp: loaded support on port[0] = 21 06:02:53 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r0, 0x107, 0xe, 0x0, &(0x7f0000000180)) 06:02:54 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:02:54 executing program 4: setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000000)=@req={0x0, 0x0, 0x7fff}, 0x10) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000180), 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000009c0)={'sit0\x00', &(0x7f0000000940)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, @remote, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7810, 0x0, 0x3b}}) 06:02:54 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0x40086602, &(0x7f0000000100)) [ 442.360181][T15624] IPVS: ftp: loaded support on port[0] = 21 06:02:54 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, 0x0, &(0x7f0000000200)) 06:02:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="480000001400812cf1e14319147fd108021100b9eb1b7c8687811b59d0441c02000000461eb8860000000002000000000000", 0x32}, {&(0x7f00000001c0)="cb85c927876acf72c915cea3a6d4c48ca0f67a89a050", 0x16}], 0x2}, 0x0) 06:02:55 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:02:55 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000480), &(0x7f00000004c0)=0x8) [ 443.373513][T15657] IPVS: ftp: loaded support on port[0] = 21 06:02:56 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:02:56 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={&(0x7f0000000700)={0x14, 0x0, 0x124}, 0x14}}, 0x0) 06:02:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="480000001400812cf1e14319147fd108021100b9eb1b7c8687811b59d0441c02000000461eb8860000000002000000000000", 0x32}, {&(0x7f00000001c0)="cb85c927876acf72c915cea3a6d4c48ca0f67a89a050", 0x16}], 0x2}, 0x0) 06:02:56 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:02:56 executing program 5: socket$inet6_sctp(0xa, 0x1, 0x84) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000004c0)=@assoc_value, &(0x7f0000000500)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, &(0x7f0000000140)) [ 444.518510][T15690] sctp: [Deprecated]: syz-executor.5 (pid 15690) Use of struct sctp_assoc_value in delayed_ack socket option. [ 444.518510][T15690] Use struct sctp_sack_info instead [ 444.603846][T15692] IPVS: ftp: loaded support on port[0] = 21 [ 444.880837][T15701] IPVS: ftp: loaded support on port[0] = 21 06:02:57 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000840)={'wg2\x00'}) 06:02:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="480000001400812cf1e14319147fd108021100b9eb1b7c8687811b59d0441c02000000461eb8860000000002000000000000", 0x32}, {&(0x7f00000001c0)="cb85c927876acf72c915cea3a6d4c48ca0f67a89a050", 0x16}], 0x2}, 0x0) 06:02:57 executing program 5: io_uring_setup(0x756c, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1}) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) 06:02:57 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:02:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="480000001400812cf1e14319147fd108021100b9eb1b7c8687811b59d0441c02000000461eb8860000000002000000000000", 0x32}, {&(0x7f00000001c0)="cb85c927876acf72c915cea3a6d4c48ca0f67a89a050", 0x16}], 0x2}, 0x0) 06:02:57 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0x400448c9, &(0x7f0000000100)) 06:02:58 executing program 5: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) read$qrtrtun(r0, 0x0, 0x0) [ 446.077600][T15752] IPVS: ftp: loaded support on port[0] = 21 06:02:58 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:02:58 executing program 4: sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="480000001400812cf1e14319147fd108021100b9eb1b7c8687811b59d0441c02000000461eb8860000000002000000000000", 0x32}, {&(0x7f00000001c0)="cb85c927876acf72c915cea3a6d4c48ca0f67a89a050", 0x16}], 0x2}, 0x0) 06:02:58 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, 0x0, 0x0) 06:02:58 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:02:58 executing program 5: clock_nanosleep(0x2, 0x0, &(0x7f0000000040)={0x0, 0x989680}, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x0], 0x1}, 0x58) [ 446.910658][T15782] IPVS: ftp: loaded support on port[0] = 21 [ 447.152969][T15787] IPVS: ftp: loaded support on port[0] = 21 06:02:59 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000340)={'ip6gre0\x00', 0x0}) 06:02:59 executing program 4: sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="480000001400812cf1e14319147fd108021100b9eb1b7c8687811b59d0441c02000000461eb8860000000002000000000000", 0x32}, {&(0x7f00000001c0)="cb85c927876acf72c915cea3a6d4c48ca0f67a89a050", 0x16}], 0x2}, 0x0) 06:03:00 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:03:00 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) [ 448.418094][ T3124] ieee802154 phy0 wpan0: encryption failed: -22 [ 448.424797][ T3124] ieee802154 phy1 wpan1: encryption failed: -22 06:03:00 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, 0x0, 0x0) 06:03:00 executing program 4: sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="480000001400812cf1e14319147fd108021100b9eb1b7c8687811b59d0441c02000000461eb8860000000002000000000000", 0x32}, {&(0x7f00000001c0)="cb85c927876acf72c915cea3a6d4c48ca0f67a89a050", 0x16}], 0x2}, 0x0) 06:03:00 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000080), 0x8) [ 448.760596][T15844] IPVS: ftp: loaded support on port[0] = 21 [ 448.809747][T15845] IPVS: ftp: loaded support on port[0] = 21 06:03:01 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={0x0}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:03:01 executing program 5: select(0xffc99a3b, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x77359400}) 06:03:01 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000280)) 06:03:01 executing program 4: r0 = socket$kcm(0x10, 0x0, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="480000001400812cf1e14319147fd108021100b9eb1b7c8687811b59d0441c02000000461eb8860000000002000000000000", 0x32}, {&(0x7f00000001c0)="cb85c927876acf72c915cea3a6d4c48ca0f67a89a050", 0x16}], 0x2}, 0x0) 06:03:02 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) [ 450.047299][T15902] IPVS: ftp: loaded support on port[0] = 21 06:03:02 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000a40), 0x0, 0x0) mmap$snddsp_control(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x83000000) 06:03:02 executing program 4: r0 = socket$kcm(0x10, 0x0, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="480000001400812cf1e14319147fd108021100b9eb1b7c8687811b59d0441c02000000461eb8860000000002000000000000", 0x32}, {&(0x7f00000001c0)="cb85c927876acf72c915cea3a6d4c48ca0f67a89a050", 0x16}], 0x2}, 0x0) 06:03:02 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={0x0}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:03:03 executing program 5: r0 = syz_open_dev$vcsu(&(0x7f0000000280), 0x3, 0x0) read$qrtrtun(r0, 0x0, 0x0) 06:03:03 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) [ 451.218984][T15937] IPVS: ftp: loaded support on port[0] = 21 [ 451.222777][T15929] IPVS: ftp: loaded support on port[0] = 21 06:03:03 executing program 4: r0 = socket$kcm(0x10, 0x0, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="480000001400812cf1e14319147fd108021100b9eb1b7c8687811b59d0441c02000000461eb8860000000002000000000000", 0x32}, {&(0x7f00000001c0)="cb85c927876acf72c915cea3a6d4c48ca0f67a89a050", 0x16}], 0x2}, 0x0) 06:03:03 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)=ANY=[], 0x5a) 06:03:03 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000001180)={0x0, 0x20, &(0x7f0000001080)=[@in={0x2, 0x0, @rand_addr=0x64010101}, @in={0x2, 0x0, @dev}]}, &(0x7f00000011c0)=0x10) 06:03:03 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={0x0}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:03:04 executing program 4: socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="480000001400812cf1e14319147fd108021100b9eb1b7c8687811b59d0441c02000000461eb8860000000002000000000000", 0x32}, {&(0x7f00000001c0)="cb85c927876acf72c915cea3a6d4c48ca0f67a89a050", 0x16}], 0x2}, 0x0) 06:03:04 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:03:04 executing program 0: r0 = io_uring_setup(0x65d1, &(0x7f0000000340)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000005c0)=[{&(0x7f00000003c0)=""/186, 0xba}, {&(0x7f0000001ac0)=""/4096, 0x1000}], 0x2) [ 452.257112][T15994] IPVS: ftp: loaded support on port[0] = 21 06:03:04 executing program 4: socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="480000001400812cf1e14319147fd108021100b9eb1b7c8687811b59d0441c02000000461eb8860000000002000000000000", 0x32}, {&(0x7f00000001c0)="cb85c927876acf72c915cea3a6d4c48ca0f67a89a050", 0x16}], 0x2}, 0x0) 06:03:04 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) [ 453.174951][T16021] IPVS: ftp: loaded support on port[0] = 21 06:03:05 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x1, 0x4000) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, 0x0, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x2}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0xb5}]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0x4044) syz_genetlink_get_family_id$gtp(&(0x7f0000000800), r0) 06:03:05 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000140), &(0x7f0000000180)=0x4) [ 453.553898][T16045] IPVS: ftp: loaded support on port[0] = 21 06:03:05 executing program 4: socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="480000001400812cf1e14319147fd108021100b9eb1b7c8687811b59d0441c02000000461eb8860000000002000000000000", 0x32}, {&(0x7f00000001c0)="cb85c927876acf72c915cea3a6d4c48ca0f67a89a050", 0x16}], 0x2}, 0x0) 06:03:05 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:03:06 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:03:06 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000100), 0x10) [ 454.368547][T16086] IPVS: ftp: loaded support on port[0] = 21 06:03:06 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x1, 0x4000) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, 0x0, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x2}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0xb5}]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0x4044) syz_genetlink_get_family_id$gtp(&(0x7f0000000800), r0) 06:03:06 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, 0x0, 0x0) [ 454.852822][T16111] IPVS: ftp: loaded support on port[0] = 21 06:03:07 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(0x0, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:03:07 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, 0x0, 0x0) 06:03:07 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, 0x0, &(0x7f0000000380)) 06:03:07 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) [ 455.694296][T16143] IPVS: ftp: loaded support on port[0] = 21 06:03:07 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, 0x0, &(0x7f0000000500)) 06:03:08 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, 0x0, 0x0) 06:03:08 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0x4020940d, &(0x7f0000000100)) [ 456.371953][T16167] IPVS: ftp: loaded support on port[0] = 21 06:03:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 06:03:08 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}], 0x3, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:03:08 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(0x0, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:03:09 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 06:03:09 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)={0x0, 0x0, @b}, 0x48, 0xffffffffffffffff) 06:03:09 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0x6, 0x0) [ 457.514839][T16206] IPVS: ftp: loaded support on port[0] = 21 [ 457.608925][T16207] IPVS: ftp: loaded support on port[0] = 21 06:03:10 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 06:03:10 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}], 0x3, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:03:10 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000740)={0x0, @in={{0x2, 0x0, @broadcast}}}, &(0x7f0000000800)=0x98) 06:03:10 executing program 0: add_key(&(0x7f0000000000)='dns_resolver\x00', 0x0, &(0x7f0000000080)='5^', 0x2, 0xfffffffffffffffe) 06:03:10 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(0x0, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:03:11 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 06:03:11 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000001180)={0x0, 0x68, &(0x7f0000001080)=[@in={0x2, 0x4e20, @rand_addr=0x64010101}, @in6={0xa, 0x4e23, 0x0, @private0, 0xfffffff7}, @in={0x2, 0x0, @dev}, @in6={0xa, 0x4e24, 0x0, @mcast2, 0x3f}, @in={0x2, 0x4e22, @multicast2}]}, &(0x7f00000011c0)=0x10) [ 459.527397][T16264] IPVS: ftp: loaded support on port[0] = 21 [ 459.540830][T16269] IPVS: ftp: loaded support on port[0] = 21 06:03:11 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000007c0)=@bpf_lsm={0x1d, 0xa, 0x0, &(0x7f0000000700)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:03:12 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="480000001400812cf1e14319147fd108021100b9eb1b7c8687811b59d0441c02000000461eb8860000000002000000000000", 0x32}], 0x1}, 0x0) 06:03:12 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}], 0x3, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:03:12 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x0, 0x0, &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 06:03:12 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x4, 0x1, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3}, 0x40) 06:03:12 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, 0x0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) [ 460.977992][T16325] IPVS: ftp: loaded support on port[0] = 21 06:03:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="480000001400812cf1e14319147fd108021100b9eb1b7c8687811b59d0441c02000000461eb8860000000002000000000000", 0x32}], 0x1}, 0x0) 06:03:13 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000280), 0x0, 0x0) read$qrtrtun(r0, 0x0, 0x0) [ 461.393984][T16348] IPVS: ftp: loaded support on port[0] = 21 06:03:13 executing program 5: socket(0x2c, 0x3, 0x9) 06:03:13 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {0x0}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:03:14 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="480000001400812cf1e14319147fd108021100b9eb1b7c8687811b59d0441c02000000461eb8860000000002000000000000", 0x32}], 0x1}, 0x0) 06:03:14 executing program 0: getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000240)) 06:03:14 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, 0x0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:03:14 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x4a802, 0x0) [ 462.561399][T16383] IPVS: ftp: loaded support on port[0] = 21 [ 462.962571][T16401] IPVS: ftp: loaded support on port[0] = 21 06:03:15 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="480000001400812cf1e14319147fd108021100b9eb1b7c8687811b59d0441c02000000461eb8860000000002000000000000", 0x32}, {0x0}], 0x2}, 0x0) 06:03:15 executing program 0: syz_open_dev$dri(&(0x7f0000000000), 0x1, 0x4000) 06:03:15 executing program 5: socket(0x26, 0x5, 0x9) 06:03:15 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="480000001400812cf1e14319147fd108021100b9eb1b7c8687811b59d0441c02000000461eb8860000000002000000000000", 0x32}, {0x0}], 0x2}, 0x0) 06:03:16 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, 0x0) 06:03:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="480000001400812cf1e14319147fd108021100b9eb1b7c8687811b59d0441c02000000461eb8860000000002000000000000", 0x32}, {0x0}], 0x2}, 0x0) 06:03:16 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000001200)={0x0, 0x0, &(0x7f00000011c0)={&(0x7f0000000d00)={0x14}, 0x14}}, 0x0) [ 465.854508][ T56] Bluetooth: hci5: command 0x0406 tx timeout 06:03:18 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {0x0}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:03:18 executing program 5: r0 = io_uring_setup(0x37d8, &(0x7f0000000000)) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r0, 0x7, 0x0, 0x1) 06:03:18 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="480000001400812cf1e14319147fd108021100b9eb1b7c8687811b59d0441c02000000461eb8860000000002000000000000", 0x32}, {&(0x7f00000001c0)}], 0x2}, 0x0) 06:03:18 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0x400454ca, &(0x7f0000000100)) 06:03:18 executing program 1: ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f0000000300)={@local}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f00000012c0)=ANY=[@ANYRES64=r0]) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f0000000300)={@local}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f00000012c0)=ANY=[@ANYRES64=r2]) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f00000012c0)=ANY=[@ANYRES64=r4]) r6 = perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x7e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x89a1, &(0x7f0000000300)={@local}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r7, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r6, 0xd000943e, &(0x7f0000000240)={r8, 0x0, "5f5720e2c1ae07adae7c99cef367b2249dc7016941ff8b201feb5576b85657bfa9aa8436e504dbd32b2d77d8e4b8802f66d7c67bfab65eaa3e0929424e5e3c1d9bdcf06e0358bf8f04d22ab55f11186734e3164503a01beaf328bf4be2d86540f60a47dabdd3b2ad29ac88b4d2bcb0875a4ce62910fe711e4ac5d23f1c44521a0f77d2dfe310bf643995d095effaf1b89428b5657193347f07cc99850cf6a4b57b3024b1081a29383e7c8447a2404e2d9bdf7a34459f7bc8e20e79cc9391ce1bbe72ae4fdda1fb2673261285b5a16daffc6025b769239d6e53b99d99745715726667a73895e6391bfe74c70ce87eb667450c406f2afd482176c94825bd0000d1", "61139c2bcfa973854f7ffd2b88fc1fd5ebec1ba0e66c823699aad2cbcafeb5f58bbb876064019975410147c2d639318931fab7c9d69935b5c19a7178c57e4121e8a827ad0763699e984fd4f8025f82f3a08be13b6adf92674f4b8bdc03ffbbda4c8f170562346b6400c151882a01d95d23caef8f9823fe426d1923c1bc2cc0820365b6f23343dc8a45f9adae04ad1643b79c5321623fafa42c67f884880c8880e34e721525612ff811eb1c87609d22841ce115d80253df749c28ab0752fadedd3949c40b7b2ebe4efe9b3b754d8b40128e454183d088683cd88bf3ed7fcff56f42f71fda46b543ea639170205a487ad102d7a8eee9ba119e18a5e01ee334ada8c617f7ed0dd500e1403685df2541c295c1d54e529fb62f6553e28a5229b3883908b6035fac525f9146f80962597d43f99ccc3d0b3f5c072156879b9eda90b4496b97f9aea72150e73b7ccb5541da59f7d5af7a56702b7f8910d40075575a7f64b44f928eeae678605bb6fdb079cb00241c4b1a37244e8ae11c57191131d4850f4228a5c2bac69ad7262699522894f33b7db9c361303d6d1ed9a435ca49e19e84470f5be226346a65033e7f60b86c23ce8384695c094e207bdaea505d7d6be5fd42f094c201aedb944758d932629ee107ee37bbe3564101fd6b43ee5585c45d20f69e04a5bd6559fe2bd37dab81a7855be0d62c9ee1134ec8f65a36259c8a6d2bd91d01e12d653e594058f30ebac3aee1ed6592bfd01b4fcd74d205a09d98f0117363d075c5c5c8b51bf44f394e89d940a22b5471b266eff9059e0e7bc8c0257b8e83065809b3241309d53d02e4e7d0247469e01b25716a76a43c7d9cb06416ba0a72db4a00e3b0cf080e008872772f6b51cff079fa6c1d110b2e81c8af2fc18be0a4ac7f39bdc3cbe3641aef4b625db70afaf27b5cef7b5b71989f5fd16ab6dce4a467cbc499db056ead9d372acbd43e10284ac6c2b99cb9b08f1b835f7447705d9a89cc9174b2213c2c727a5e57c808c831802de5fff149ad6a1a955f2221e46da429ee2732cc46f619f1f3029c0714bc49c067e46c098565245705b80a2868a953eb51ff110b60b413e196c2be0e8a0deef504340dd9da81eb60460998a0e72ab2710eee8e6a4e69af48522cdeaa7f57b4e6a1fd2e02a1400ee2ce0944f91b38c2069a26f650538b76be69c4439227533771ef121b513cb8eaf32136918f973b6b56eef02553aaac2a1ba3de72fad79058c57a002f4904b19361293cfab03721552e9ccc5afe640a1490da45f3285d581eafebdb40df19537e02f580ffacc84f04a89a9dadd7b7d83cede03a2a618c8c5ffbd7f64423ecda6e23f492aa30888ea3b635ad3a19f86fae40944e609963bb78d2ae1a1b55cf78563ea44ee4670b316df43bf37fd7186f46bd432a535e9e9e30055a2c9451a5eb2ce33ad4a0214f23172ce79c4fd10dc4e4841072dbd8abed12aff49f208de64a04705f02a7bc517aa2b1f6b310a120335b1ec3e5eaa08e1fe595c74ff08cd6915805cd1789fea11e5b59a306562c2e74bdb964768e9fdaf16460e8ad75be46aec19b5af3316f6b4454199f5451749195acf8aee4e5727cfccd2b260a3ff3c77cb2cbb83bcf846d3a61cd8b40c9e464f901cdb0b3153b526375c7e102bc5304021990599b6b6eb6e05e76b99fff54e9ee9180e7dc50232132301fcd0b07237cf355d99d4550e46bff67a9fbbba7132cfbdaf7956cc21581587e1cb1a1ca4c2526f176f0c30fec790868f70b6bdde7393393458907ac9b710523e9512b6edb48b00ea68eade02f434206fbcaf4089abf5388630e05a8df31776edeefa03908819ddf67e484b94b364676de41695241ca13bd7fcfb6cbb08483facf97f6a4594e8b4ef07de506cf0e3349d4bcf91b3683ef824b086a1f9dbaebdfc33e0f10dc9152cbc2726f9ef7482ddcb560fab9d6725a8f585e1902bb7d5a3a584dac2e2bf67df6f2024785cd9d2f6edb1ab5758e5c77c405f796e54edb222002cbb9426a2473dcd0d6f4ad3173156910edd75210df7ac182549c2d92c1ee524e89d4f03b0dd3e2b2b7796be75e8d881e10f35eb2d0a60ef8b7103f2775c3c4e2a92a04acc5bf5c0433901cfa37d7871be90ba02e5739b6ccbce3eb6d4497b754d24c4bf73ab73688c689b375eb75adbd87fe0225b4859eeee0b90e6cbba23edef20f17f4742e767df6b835306ed42da38b29ba317830de73b6441d1d07ae1824f95cbe21ba205261ceb31dd6e2f17735c317cebcc89548911ad044a56e3e39a300514bc022afd3bd1fa98b6ec1d217c6608ee11ea076d7db354d474ae45bddd1558087a02177caef5b06d55336200b310c5e4d4e5f519bb9d8ece714ec83c4352b0a414c1fb57d921c8094876c377bc40922e570dee22d404665938822d77651bd639699bea0151c76860c99d71607f1a2db4982d0b9cc90979cece8e42cb8ae294fe6262f8271c7338794ad62d6914f22730f69a5c78d0db848cb6e5dac9e681da55fa43171c90f682752a24da30e71f3d1a034e6cb371d6516acd4a71b957bc98f217e190a5e3c33309e796b234b39999a2243ef4e250ce9b8cdb788ecf1de455576df576aa6ce37c530972570a52490d643f7554d66db697a4f8fdc05dbc96032f2166dd73bd73efa0087e7743a039708eb0a13aa13e1c2c788bce52fb00766999663bb7fdebb60ee997e905a3a1f3aa8c252b3dff69aa626b759d631efa228b0b89cdaad42199fdebcf6473557812f4641c53ba10085fd3b1e4f724bfbbad419fe77c3aaa59fafe55cdcb6ff8dd64b773a08f34ef9743579418af3126e559dd1063fffc6acced71c6989175208d3639edd439ef487685e19d570cf83d85d0864dd34dd8197630165793e84c7bd8c4070b53e1ff2f41eac96ba1491a0f19846e40dad07c97def97d0fe0b61303aa56e2841f1242702164c7358133d2f05f5639e46e8034c52589c05b2048f0f07dbeae584ce190d3663b22332742fddc57870dbce7daf8bd62c651cf03b058ac362c76358a69c0bc61c914c67bb2a25522d12affd5f398a28099af8f8f79113d33b3021ca0f939af394ff7e0ca02ca97f337bf9ca7c720641c54dc3fd994b4e66b3b9f66d8131233f5ce9e3832a3480d958d27a0763750f5f1f2f88a9df218a125b48b5379fee9a85daedf72f413894d1e357d3175b80be3d547a0bcd77aaff437bb4eb1f66909a8084bbbf30550ddc8733dda5eafdf81b87a4e8f3a142a74b47e17feed5bc160ac2ddc995ed9c16fa197befd60a74df350f6aa4b92f922a989194738f66de66d459148b83b9e2371ade64f5544e717495ee369de021bbe9cf7e28687308ecaf90590aa167740fb12d782580498ab53fe31d9f8a05c680183e4eb849100fb448e7a93b4311f198569a058cf2e8e171b0fa47f94d2fc6d2df765fecc735f2edad5e9611c168b081e383f21891a70022793a692b5a2f153111d2cd100abef11fcad9e2aa409d53d99e2717c7e5ac0cdb586dfa7d57ea6b6b9f6f847161bd851b0e88f121e7b8458f0ed19179f4df18f31fcc56e5c88675c09c72b30b8b1925cb3b7758e47b3165a4a999a26b2b6c87fa14d3b31f6378b5788b645db77a1e6a269ff8a184e00742138ea3061bfa7e659866bbaa71c32671a39ba3d065f22adffdc2d8a944e4e64323a599ee2f657acf66a413a33131f40dd03440ed4203d398ed65fcfe4d507351f03ec22c868c46a7e56d46f45b701aa6f8d66fb9b8963687a9a83301c9354519572109d6949d57be177dc6d6400c411c53c8914073b433da0698b311946da6430301e46bc38a0e1ef63a00b63217746c3f91eb5edcfe15751930b09d1b4e8ca4450ed64a3eebd93ba0aaa00647c730d85863628adf2a3d53a9e61e8a8ccabfa69591f29d97205f1cbea536928b1ae0afd6a2e20cc29abfefac8e13605564d527a2691ba62e05569698d17c3ca6a778cab1f20f4d5c6199edb91d53309d02e7a2eaf964bd2f318182df36fe18d00c89e6639ea0fe4fd0321d5432eb959769f267aa376c87283809865fbc002d2350b15eed22e814a21b85e1600025975ef1624a1aadbc73cbe8edd09009eda0e740f1b5f93c85a3ac756102bdef3024bdf05db7bdf2efeaa98ea0aa67dfb79ea58264d843efb39e4a24033525ecd7db61c3c524546da6f535c803a54e9c87eaae748e612dd3800cd43692facd86940b589a8b831e6c0911df2589cbb5fc4d4f2821140dbc835d8f944ffb8d848753dc4958b8c82ff369ef7cc70cae04a32e18d7bc9091850cf1de64cc134cc91d3c4854f3cb61925a94fa9d699ae269e6f73eba8579063875362bb1ecf6756071b3267c44fb5269d80ad732086e74452718d088886e53425a7dd51eedb79c9068272000895219f5342f19f32fe9263d2088d15e1edfb2031cea7813425ed5c1d615e4a855b5550787c554400ea37ff533b444fad6a7dad57e0a73ede953146f89aa7180ee8204449c42a09e2adbf9697999a2e7e362015361c354dcd36d9e6c4088fc828cc5887ddddde204c5f369da388f090d55d09559945be9f80860f10b4a9ad43a22c67f9fefff07991bdd7868147aef7b7341845a8d26c2a715ad3374e9fd17846d3a6b2fc65af22ceb0d130b4b5e94e88a750b90c133dca4b0a21247b8b5c2857dff94936a78b46973ea0987cad36e5fc8600af37eb971f9b3dfb4121983138d472abf150fbf74178a2897200077fbedad1d54b6cc63ea026f5c175b64b1a49a472e04e534f714f57e097642c7fbb33ae03828bbd741f1b4b31e95b55080de363345811b1fc3197d69d8f6a63d13bc8c2120664817d421b6d9fb5c9c48635247e27992d33a3c3aa56f6c324a6ea27b7e0ad4e6a3e49b9171d1482f2c550f310bda4b0c39c0e8ec8de659cd5b6c6dac4c33eab3ab66f17ffe89a6536affcfedfa6f9fea43150826d1e6d9f1faf8eb82152cd8bfbb2592ab7cfb1e9b67983838e0d92afe774a77cf5148bf15122c87a39ae9467e5be264a516302032ffe227bf57adaeca7937b769a4a855f0aecea2643714df2d6713764deafc6db88f1bd52b09ea4c7f77fd8f9897827f94b06068ab34a255e643739e54c41317ad1f74dcc153a5764d471fbbdfb10e1d61bb897c88602bd8b310d6135ce108cad3937e0f50a60542cb8350d2df5b4e95877cac8f3b64b03a7ef7524b740674df38685a638f0087738a3f53ee062a254e4183b519ebdbb535bbed510f5a275d0cfd9b728ea204d023ca1ad2fe8ec15bf8854fb5276d4fea8d4e292438fb2eebbb1aa3705116010289f13a70ba328ea1099b861f43cac4a24a75694d89f61025fb497ba56a6c7097311c5bfdc631d657f58714013a201c43db7d603b9f54a2bfe72c559a280a2f5f72c35b39"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81e8943c, &(0x7f000004d5c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004d7c0)={0x80, [{}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {r0}, {r2}, {r4, r8}, {}, {r10}], 0xfd, "442fef90a75992"}) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) 06:03:18 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, 0x0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) [ 466.915235][ T1988] block nbd1: Attempted send on invalid socket [ 466.921636][ T1988] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 466.941190][T16484] VFS: could not find a valid V7 on nbd1. 06:03:19 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="480000001400812cf1e14319147fd108021100b9eb1b7c8687811b59d0441c02000000461eb8860000000002000000000000", 0x32}, {&(0x7f00000001c0)}], 0x2}, 0x0) 06:03:19 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) write$UHID_SET_REPORT_REPLY(r0, 0x0, 0x0) [ 467.031463][ T2038] block nbd1: Attempted send on invalid socket [ 467.038132][ T2038] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 467.050824][T16484] VFS: could not find a valid V7 on nbd1. 06:03:19 executing program 0: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380), 0x103040, 0x0) [ 467.194645][T16489] IPVS: ftp: loaded support on port[0] = 21 [ 467.305807][T16490] IPVS: ftp: loaded support on port[0] = 21 06:03:19 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x0, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:03:20 executing program 1: r0 = syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000180)=0xc) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = geteuid() stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = creat(&(0x7f0000000540)='./file0\x00', 0x20) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000380)=0xa8) getresgid(&(0x7f00000003c0)=0x0, &(0x7f0000000400), &(0x7f0000000440)) r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(r9, 0xee00, 0x0) r10 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(r11, 0xee00, 0x0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000480)={{}, {0x1, 0x4}, [{0x2, 0x5, r1}, {0x2, 0x5, r2}, {0x2, 0x5, 0xee01}, {0x2, 0x4, r3}, {0x2, 0x4, 0xffffffffffffffff}, {0x2, 0x1, r4}, {}, {0x2, 0x2, r6}, {0x2, 0x3, 0xee01}], {0x4, 0x5}, [{0x8, 0x5, r7}, {0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, r9}, {0x8, 0x4, 0xee00}, {0x8, 0x2, r11}, {0x8, 0x1, 0xee01}], {0x10, 0x2}}, 0x9c, 0x2) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) 06:03:20 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {0x0}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:03:20 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="480000001400812cf1e14319147fd108021100b9eb1b7c8687811b59d0441c02000000461eb8860000000002000000000000", 0x32}, {&(0x7f00000001c0)}], 0x2}, 0x0) [ 468.365297][T16544] IPVS: ftp: loaded support on port[0] = 21 06:03:20 executing program 5: syz_open_dev$audion(&(0x7f0000000140), 0x1, 0x0) 06:03:20 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000001180)={0x0, 0x10, &(0x7f0000001080)=[@in={0x2, 0x0, @dev}]}, &(0x7f00000011c0)=0x10) [ 468.906762][ T2038] block nbd1: Attempted send on invalid socket [ 468.910584][T16556] IPVS: ftp: loaded support on port[0] = 21 [ 468.913317][ T2038] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 468.933578][T16547] VFS: could not find a valid V7 on nbd1. 06:03:21 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) 06:03:21 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="480000001400812cf1e14319147fd108021100b9eb1b7c8687811b59d0441c02000000461eb8860000000002000000000000", 0x32}, {&(0x7f00000001c0)="cb85c927876acf72c915ce", 0xb}], 0x2}, 0x0) 06:03:21 executing program 5: r0 = socket$pptp(0x18, 0x1, 0x2) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 06:03:21 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000180)=""/6, 0x6}], 0x3, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:03:21 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@md0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x28f8086, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r3) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(r5, 0xee00, 0x0) getgroups(0x7, &(0x7f0000000100)=[0x0, 0x0, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff, 0x0, 0x0]) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{0x2, 0x1, r1}, {0x2, 0x4, r3}, {0x2, 0x2, 0xee01}], {0x4, 0x5}, [{0x8, 0x2, r5}, {0x8, 0x1, r6}, {0x8, 0x4, r7}], {}, {0x20, 0x3}}, 0x54, 0x3) 06:03:22 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="480000001400812cf1e14319147fd108021100b9eb1b7c8687811b59d0441c02000000461eb8860000000002000000000000", 0x32}, {&(0x7f00000001c0)="cb85c927876acf72c915ce", 0xb}], 0x2}, 0x0) [ 470.659805][T16620] IPVS: ftp: loaded support on port[0] = 21 06:03:23 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x0, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:03:23 executing program 5: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) read$qrtrtun(r0, 0x0, 0x2e) 06:03:23 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000001800), 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) 06:03:23 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="480000001400812cf1e14319147fd108021100b9eb1b7c8687811b59d0441c02000000461eb8860000000002000000000000", 0x32}, {&(0x7f00000001c0)="cb85c927876acf72c915ce", 0xb}], 0x2}, 0x0) 06:03:23 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mknodat$loop(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x1000, 0x1) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="2f6465762f6ea990c2626430008fe8c835125691e6b782498f5e521f8142824aa61f0b57bda79be632834e6ed123dc5ef977656bbd5094f18e41ff42e0c58a19991e80324f7432bbd1952b"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) 06:03:23 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000180)=""/6, 0x6}], 0x3, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) [ 471.750747][T16660] IPVS: ftp: loaded support on port[0] = 21 06:03:23 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="480000001400812cf1e14319147fd108021100b9eb1b7c8687811b59d0441c02000000461eb8860000000002000000000000", 0x32}, {&(0x7f00000001c0)="cb85c927876acf72c915cea3a6d4c48ca0", 0x11}], 0x2}, 0x0) 06:03:24 executing program 0: syz_open_dev$dri(&(0x7f00000000c0), 0x0, 0x105800) [ 472.183446][T16685] IPVS: ftp: loaded support on port[0] = 21 06:03:24 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000200)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000000180)=0x101, 0x4) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty, 0x7a8e}, 0x1c) getpeername$inet6(r1, 0x0, &(0x7f0000000140)) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(r3, 0xee00, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x21000, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303036303030302c757665725f69643d215ea7b024355b32722771295b6d0384b309102ec0f79df36875fe4f5f4ca1bbfca35d7074a2a05cbbe4df59ca0c1177830952ceff9cd8e347c352d88d0a7ea8c4ff13e3a126cc07d46dd32c788d457a38b8c3879187d4a660fcb6361a40752fc346bf06", @ANYRESDEC=0xee01, @ANYBLOB=',group_id=', @ANYRESDEC=r3, @ANYBLOB=',max_read=0x0000000000000006,default_permissions,blksize=0x0000000000000600,allow_other,blksize=0x0000000000000400,max_read=0x0000000000000009,blksize=0x0000000000001200,max_read=0x0000000000000002,blksize=0x0000000000000200,fowner=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 06:03:24 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000180)=""/6, 0x6}], 0x3, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:03:24 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="480000001400812cf1e14319147fd108021100b9eb1b7c8687811b59d0441c02000000461eb8860000000002000000000000", 0x32}, {&(0x7f00000001c0)="cb85c927876acf72c915cea3a6d4c48ca0", 0x11}], 0x2}, 0x0) 06:03:24 executing program 5: syz_open_dev$dri(&(0x7f0000000000), 0x1, 0x4000) ioctl$DRM_IOCTL_MODE_SETPLANE(0xffffffffffffffff, 0xc03064b7, 0x0) [ 473.058195][ T2038] block nbd1: Attempted send on invalid socket [ 473.069031][ T2038] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 473.104492][T16715] VFS: could not find a valid V7 on nbd1. [ 473.164249][ T1988] block nbd1: Attempted send on invalid socket [ 473.170902][ T1988] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 473.187816][T16715] VFS: could not find a valid V7 on nbd1. [ 473.296306][T16720] IPVS: ftp: loaded support on port[0] = 21 06:03:25 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x0, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:03:25 executing program 0: socketpair(0x28, 0x0, 0xfffffffb, &(0x7f0000000900)) 06:03:25 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) 06:03:25 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="480000001400812cf1e14319147fd108021100b9eb1b7c8687811b59d0441c02000000461eb8860000000002000000000000", 0x32}, {&(0x7f00000001c0)="cb85c927876acf72c915cea3a6d4c48ca0", 0x11}], 0x2}, 0x0) 06:03:25 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0x6364, 0x0) 06:03:25 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {0x0}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) [ 474.075775][T16751] IPVS: ftp: loaded support on port[0] = 21 06:03:26 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000000), 0xfd3d) [ 474.529012][T16764] IPVS: ftp: loaded support on port[0] = 21 06:03:26 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="480000001400812cf1e14319147fd108021100b9eb1b7c8687811b59d0441c02000000461eb8860000000002000000000000", 0x32}, {&(0x7f00000001c0)="cb85c927876acf72c915cea3a6d4c48ca0f67a89", 0x14}], 0x2}, 0x0) 06:03:27 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='/dev/nfd0\x00'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000000180)=0x101, 0x4) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e25, 0x0, @empty}, 0x1c) getpeername$inet6(r1, 0x0, &(0x7f0000000140)) mknodat$null(r1, &(0x7f0000000040)='./file0\x00', 0x0, 0x103) 06:03:27 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) 06:03:27 executing program 0: r0 = msgget(0x1, 0x0) msgctl$MSG_INFO(r0, 0xc, &(0x7f0000001180)=""/125) r1 = fork() msgctl$IPC_SET(r0, 0x1, &(0x7f0000000000)={{0x2, 0xee00, 0xee00, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x7, 0x9, 0x40, 0x0, 0x3, 0x40, 0x0, 0x8, r1}) msgget$private(0x0, 0x200) 06:03:27 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, 0x0) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:03:27 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {0x0}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:03:27 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="480000001400812cf1e14319147fd108021100b9eb1b7c8687811b59d0441c02000000461eb8860000000002000000000000", 0x32}, {&(0x7f00000001c0)="cb85c927876acf72c915cea3a6d4c48ca0f67a89", 0x14}], 0x2}, 0x0) 06:03:27 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) syz_mount_image$squashfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x1000, 0x9, &(0x7f0000000740)=[{&(0x7f0000000200)="c6f9ce09dbd6769ec704e281faa68abde28fcb83b2e4cc59ed57de22b544eee46e30e084c1b2fd8f60c5e8d72968189f3e04a80869c2ff04a1a27bf1ef03eec5870c83d6e6ba7694aca1a700dea4dfcb0605cfe72bb92ba213f71b05a5169a19dc74ad2acdee03216c855d20053a9c73dec573754f462e4d17c436b037836cb4aa13964784db5dc02ae330b22f8d9dfaddadeace798489c26025966059bb66df849ff3948f60212a708bd21e8a4c77b670f74b2474dd5fac974691337b37a2739098fdede984ccd6d2361eba418b982b3334cd3a911c73a946594ee7", 0xdc, 0x1}, {&(0x7f0000000300)="71da9e3c8aaa9fcc955c3f472b1e6b5be09b85733df56b2e04bb1f58bf54d71bbb900e9cf5f9cabd13753cf2283b62b15a98cc017363f788199807b4fcd9fa474daa07faae614389d1dd50a9b2461c00df9174cadf06ddb20d48eb95fb5efbdb84f7e13aa2a9a1977b71318b492ee09c6f349000c584aac830afafdcd3c9636c3db882bd188079f709d41cfb22a383a913d47037ab4ac1701fcc64d8a49d04b7dffc341bee75f02cc2d97a997cc91344a8b648882940", 0xb6, 0xeda}, {&(0x7f0000000100)="0de1565df58ba3acbbb06624fa29bcb0fdb035c65406a689112746a4084da252f5bf3b471abdbab3d6b7ac805b409677d7e77b4503f91f82bbf8e4", 0x3b, 0x7fffffff}, {&(0x7f00000003c0)="c3dea29fb73f59cc10307ef31f68cf0db00f9d41be1ca22561f169294359ee483701dd35f3fb8e3867c1a5d8ce2dae669a9b517144c5834215ece4b23bfca45288c0e298ad008cd85578b15cbfea3b9200f30c32b8cbb4de8744a2d4e81d044df7fc0d26d446b6604ebe36b1ce15ae5e5266c87972b2740e5243fdea7846aa2fc7ca662bc2d7396cbf6294e71e2285dcaa705e9bad4dc2016a5283086bc6d1ff987132999987e40317a9460d", 0xac, 0xffff}, {&(0x7f0000000180)="c6c74020894cea2a622cdc34cae8c25a645aa5e4b3428767c60cf970", 0x1c, 0x8}, {&(0x7f0000000480)="006fd6e67decb45633da63c68f4bc3ba83cdc118a23bee895edef36bea5924612a6ed7ddfbb2453c70e629d2b24895de8a885738071e4aee0de97503f972a63951b0241283808afa7e3ce2bccc0b945896593d8e9e20b89bdf7e9311b12a9d02c8ffbf92c253fa8538d1ba0bb2d05dae7549b91e4358704d98e10ec9f58bf1e3", 0x80, 0x7fffffff}, {&(0x7f0000000500)="9fc0a18ff713e0fcf3a0826f6e914243622b11e1f39e75b425d9f242ddb2a3571d23dbefafa59c49b4f4578344471d92bf527fc3ca8b3546b9aae19126", 0x3d, 0x3ff}, {&(0x7f0000000540)="754786536399e091b005752340e1841de0621285ca0401db9de25e296d534e52106e0126bc1ebb62f260de93197109402d6e471f7f40ea842579e9e4af7d6ece6d238319eabbed245fa0f54a8393f32468578784a014d757ddff4e0bb64465f2a02a3eb37f93443a6f7d3263e94d8b2643512ac4641a5e7b4079b09530b35f96a1620d6021c2b847de0024c5f3e312af9ca639ab324dd968d3589a3169c95eaaf8435e77977a3e98fd7e58547503977c381be0d853df6f04332c3b81c5094f580214d3834e8b066bd8d5dae17fbe321d74d1661de3dc5eb6c84421981e0c702b053759fda81ff0434d3fa98e67a072f1bb892d663054", 0xf6, 0x3}, {&(0x7f0000000640)="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", 0xff, 0x9}], 0x902841, &(0x7f00000007c0)={[{'.!$,}'}, {')'}, {':]'}, {'&o'}], [{@subj_user}, {@hash}, {@subj_type={'subj_type', 0x3d, '/dev/nbd'}}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x65, 0x65, 0x35, 0x32, 0x38, 0x55, 0x34], 0x2d, [0x35, 0x65, 0x32, 0x35], 0x2d, [0x30, 0x62, 0x39, 0x33], 0x2d, [0x62, 0x1b, 0x38, 0x37], 0x2d, [0x65, 0x30, 0x36, 0x58, 0x32, 0x31, 0x62, 0x36]}}}, {@uid_lt}]}) 06:03:27 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, 0x0, 0x0) [ 475.921279][T16821] IPVS: ftp: loaded support on port[0] = 21 [ 476.032501][T16827] IPVS: ftp: loaded support on port[0] = 21 06:03:28 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="480000001400812cf1e14319147fd108021100b9eb1b7c8687811b59d0441c02000000461eb8860000000002000000000000", 0x32}, {&(0x7f00000001c0)="cb85c927876acf72c915cea3a6d4c48ca0f67a89", 0x14}], 0x2}, 0x0) 06:03:28 executing program 0: syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x4040) [ 476.310871][ T1988] block nbd1: Attempted send on invalid socket [ 476.317882][ T1988] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 476.347616][T16840] VFS: could not find a valid V7 on nbd1. [ 476.366982][T16840] loop1: detected capacity change from 0 to 264192 [ 476.548727][ T2038] block nbd1: Attempted send on invalid socket [ 476.555192][ T2038] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 476.638430][T16840] VFS: could not find a valid V7 on nbd1. 06:03:28 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {0x0}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:03:28 executing program 5: r0 = socket(0x10, 0x3, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) syz_genetlink_get_family_id$fou(&(0x7f0000005180), r0) 06:03:28 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='bdev\x00', 0xa021, 0x0) r0 = syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x208400, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@default_permissions}, {@max_read={'max_read', 0x3d, 0x3}}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0x800}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt={'uid<', 0xee00}}, {@seclabel}, {@func={'func', 0x3d, 'BPRM_CHECK'}}, {@appraise_type}]}}) name_to_handle_at(r0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)=@orangefs={0x14, 0x1, {"35d9875546e5805627c9b8623bf97c90", 0x3}}, &(0x7f00000003c0), 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x200000, 0x102) 06:03:29 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="480000001400812cf1e14319147fd108021100b9eb1b7c8687811b59d0441c02000000461eb8860000000002000000000000", 0x32}, {&(0x7f00000001c0)="cb85c927876acf72c915cea3a6d4c48ca0f67a89a0", 0x15}], 0x2}, 0x0) 06:03:29 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, 0x0) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:03:29 executing program 0: socketpair(0xf, 0x3, 0x0, &(0x7f0000000200)) [ 477.375741][T16889] IPVS: ftp: loaded support on port[0] = 21 [ 477.501862][T16896] fuse: Bad value for 'fd' [ 477.654453][T16897] fuse: Bad value for 'fd' 06:03:29 executing program 5: socket(0x29, 0x2, 0x1000) 06:03:29 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="480000001400812cf1e14319147fd108021100b9eb1b7c8687811b59d0441c02000000461eb8860000000002000000000000", 0x32}, {&(0x7f00000001c0)="cb85c927876acf72c915cea3a6d4c48ca0f67a89a0", 0x15}], 0x2}, 0x0) [ 477.899129][T16923] IPVS: ftp: loaded support on port[0] = 21 06:03:30 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) syz_mount_image$sysv(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000100)=[{&(0x7f0000000200)="64f92fe9218d6c59983dc7b07ef933199e359505e968c70bd190efd727799cfd9d007a2e534ebbf6ae60bd0655789e1642aaaceaf7258c2681b2fdfabd551ce11f684df2fd6d7a50ef344941de22f721fdc4cf41db620b2f3be04f1dc66cf0fe90161cc6255ba38630206901dd0babcab130909a3850bbce6ad01f6ca52015990b39efeb113c42e2c90ee3f99da504b8c42b4dd6be15e624717f181bdaa2bc98d825117d44ae7accb9446fd381", 0xad, 0x7fffffff}, {&(0x7f00000002c0)="fb499f8742bb74b3dffc73b15a30bfcc7dc740b5cb141979ad239a966e4f19509aedb72ae8376724294b1fb3c95b50733bdd09968193c142594336dc95cd6ef56342eb6ed6c5b1a768ada7c7f4f1a65ebd818c495bbc9cf67f01b04b78794d31b22747a0a3ed76975c4ad6a18016bb7753da276c60a55c5672d74530780c133015ec7b8594fbf3bf5061ca149d86ba48104438dc5cbd10b1562bbbcae30d2cec9e66ca3177deae4573279a3fc077347f185facca474eb1de61c57100cff47b5b98eb63c64c838ed5ac17fc63772d7dac9987c49578739f7288e73873e3d1b2941c827006570c5a77ca963dbc5c3cede8", 0xf0, 0x8}], 0x808, &(0x7f0000000180)={[{'+&\''}, {}], [{@subj_type={'subj_type', 0x3d, 'v7\x00'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000000180)=0x101, 0x4) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e25, 0x0, @empty}, 0x1c) getpeername$inet6(r1, 0x0, &(0x7f0000000140)) openat(r1, &(0x7f00000003c0)='./file0\x00', 0x2, 0x90) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000400)={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, 0x14) 06:03:30 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x3, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:03:30 executing program 0: msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000080)=""/246) 06:03:30 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="480000001400812cf1e14319147fd108021100b9eb1b7c8687811b59d0441c02000000461eb8860000000002000000000000", 0x32}, {&(0x7f00000001c0)="cb85c927876acf72c915cea3a6d4c48ca0f67a89a0", 0x15}], 0x2}, 0x0) [ 478.730766][ T2038] block nbd1: Attempted send on invalid socket [ 478.737180][ T2038] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 478.766238][T16954] VFS: could not find a valid V7 on nbd1. 06:03:30 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000009c0)={'sit0\x00', 0x0}) [ 478.833647][T16955] loop1: detected capacity change from 0 to 264192 [ 478.851970][T16955] VFS: unable to find oldfs superblock on device loop1 [ 478.895361][T16960] IPVS: ftp: loaded support on port[0] = 21 [ 478.920014][ T1988] block nbd1: Attempted send on invalid socket [ 478.926569][ T1988] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 478.956921][T16954] VFS: could not find a valid V7 on nbd1. [ 478.969609][T16955] loop1: detected capacity change from 0 to 264192 06:03:31 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x2, &(0x7f00000004c0), &(0x7f0000000500)=0x20) 06:03:31 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, 0x0) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:03:31 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2f6465f0762f6e626430"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) 06:03:31 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x3, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:03:31 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000140), 0xc) 06:03:31 executing program 5: add_key(&(0x7f0000000000)='asymmetric\x00', 0x0, &(0x7f0000000080)="fdbd", 0x2, 0xfffffffffffffffe) 06:03:31 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000001c0)="cb85c927876acf72c915cea3a6d4c48ca0f67a89a050", 0x16}], 0x1}, 0x0) [ 479.943150][T17005] IPVS: ftp: loaded support on port[0] = 21 [ 479.960805][T17007] IPVS: ftp: loaded support on port[0] = 21 06:03:32 executing program 0: msgsnd(0x0, &(0x7f0000000100), 0x8, 0x0) 06:03:32 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x3, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:03:32 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, 0x0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:03:32 executing program 1: r0 = syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)=""/224) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) openat(r0, &(0x7f00000000c0)='./file0\x00', 0x6200, 0x20) 06:03:32 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)={0x0, 0x0, @b}, 0x48, 0xffffffffffffffff) 06:03:32 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000001c0)="cb85c927876acf72c915cea3a6d4c48ca0f67a89a050", 0x16}], 0x1}, 0x0) [ 480.844621][ T1988] block nbd1: Attempted send on invalid socket [ 480.851204][ T1988] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 480.881009][T17061] VFS: could not find a valid V7 on nbd1. 06:03:33 executing program 0: keyctl$dh_compute(0x17, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={'cbcmac(xeta-generic)\x00'}}) [ 480.933375][T17062] IPVS: ftp: loaded support on port[0] = 21 [ 481.085429][ T2038] block nbd1: Attempted send on invalid socket [ 481.091850][ T2038] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 481.108365][T17061] VFS: could not find a valid V7 on nbd1. [ 481.154242][T17066] IPVS: ftp: loaded support on port[0] = 21 06:03:33 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@sg0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 06:03:33 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {0x0}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:03:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000001c0)="cb85c927876acf72c915cea3a6d4c48ca0f67a89a050", 0x16}], 0x1}, 0x0) [ 482.006280][T17119] 9pnet_virtio: no channels available for device /dev/sg0 06:03:34 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, 0x0, 0x0) 06:03:34 executing program 1: r0 = syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = dup2(r0, r0) r2 = openat(r1, &(0x7f0000000500)='./file0/file0\x00', 0x60000, 0x81) r3 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x6, 0x2d0281) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000005c0)={{{@in6, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000540)=0x55) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r6) r7 = getuid() r8 = getgid() statx(r0, &(0x7f0000000100)='./file0\x00', 0x1000, 0x20, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) r10 = socket(0x1, 0x803, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r12 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r12, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3001000010000104000000000400000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r11, @ANYBLOB="e68d9028d200100000e88cf2fa6a39e3b5c04defd2df4b1399f1a49616b251048a4662ea56b2dcb231564c0a5424a6f5db3a"], 0x130}}, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x20, &(0x7f0000000580)={@rand_addr=0x64010101, @dev={0xac, 0x14, 0x14, 0x3a}}, 0xc) lstat(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000480)={{}, {0x1, 0x5}, [{0x2, 0x0, 0xee01}, {0x2, 0x58d4ad600e12461d, 0xffffffffffffffff}, {0x2, 0x0, 0xee00}, {0x2, 0x0, r4}, {0x2, 0x2, r6}, {0x2, 0x6, r7}, {0x2, 0x0, 0xee01}, {0x2, 0x4, 0xee00}], {0x4, 0x5}, [{0x8, 0x2, r8}, {0x8, 0x1, r9}, {0x8, 0x3, r13}], {0x10, 0x5}}, 0x7c, 0x2) mount(&(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) 06:03:34 executing program 0: sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000000), 0x1, 0x4000) 06:03:34 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, 0x0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:03:34 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{0x0}, {&(0x7f00000001c0)="cb85c927876acf72c915cea3a6d4c48ca0f67a89a050", 0x16}], 0x2}, 0x0) 06:03:34 executing program 5: setrlimit(0x7, &(0x7f0000000040)) 06:03:35 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$nfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000100)=[{&(0x7f0000000200)="1c3c4b104603843a9f4bff367f7261335e5bf17ad8084b2f08e8063ea7e4110d0dcfc389ad60c53322cab5949fb2203c63d570e008e67291e377ca73f35b03ff041ba9478fc59444613303db799bd414c71e50b4a83952295af8d26e7171052ec99f2181b7045f23af1083b35863a663fd5cdeadb9b95c2be1bdd9abd87f75da37a825c67785c2653042dcae", 0x8c, 0x7fffffff}, {&(0x7f00000002c0)="b6d58797e8db824c9bd96878047243e2edcdd8d683eadb215b92812e45097bf0c7e40a446b733153997e63c8ee2df50a423423993bac5a2ba849b2db4393cd6be553c5792ddafeb325b5f9820ed018b4c5a57b9955d30e84e07e1d7d236c699fb0283a0ea9ccad9653b6e55dedf069d6f8b1f738a97adabeabfcb5513df6ba38c38fecfe9c9267ab30b361ce507522cf9f28f732705f1101f8e04b6bd531fd933d6c2c98d2571ade14d8dbd1c8b45f2df3d7662632916717c0", 0xb9, 0x40}], 0x1000001, &(0x7f0000000180)={[{'\x00'}, {'v7\x00'}, {'v7\x00'}, {'8+-)'}]}) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) 06:03:35 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x40002060) 06:03:35 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001ac0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14"], 0xd8}}, 0x0) 06:03:35 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{0x0}, {&(0x7f00000001c0)="cb85c927876acf72c915cea3a6d4c48ca0f67a89a050", 0x16}], 0x2}, 0x0) [ 483.681710][T17145] loop1: detected capacity change from 0 to 264192 [ 483.741037][T17125] IPVS: ftp: loaded support on port[0] = 21 [ 483.771541][ T1988] block nbd1: Attempted send on invalid socket [ 483.778078][ T1988] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 483.784855][T17139] IPVS: ftp: loaded support on port[0] = 21 [ 483.791695][T17152] VFS: could not find a valid V7 on nbd1. [ 483.880315][ T1988] block nbd1: Attempted send on invalid socket [ 483.887533][ T1988] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 483.900820][T17152] VFS: could not find a valid V7 on nbd1. [ 483.920987][T17145] loop1: detected capacity change from 0 to 264192 06:03:36 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {0x0}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:03:36 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, 0x0) 06:03:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{0x0}, {&(0x7f00000001c0)="cb85c927876acf72c915cea3a6d4c48ca0f67a89a050", 0x16}], 0x2}, 0x0) 06:03:36 executing program 1: r0 = syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x14b240, 0x275) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='v7\x00', 0x8000, 0x0) 06:03:36 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, 0x0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) [ 485.012511][ T2038] block nbd1: Attempted send on invalid socket [ 485.018838][ T2038] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 485.061767][T17211] VFS: could not find a valid V7 on nbd1. [ 485.135577][ T2038] block nbd1: Attempted send on invalid socket [ 485.142012][ T2038] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 485.153480][T17214] VFS: could not find a valid V7 on nbd1. 06:03:37 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)}, {&(0x7f00000001c0)="cb85c927876acf72c915cea3a6d4c48ca0f67a89a050", 0x16}], 0x2}, 0x0) 06:03:37 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000500), 0x4) 06:03:37 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=@ceph_nfs_snapfh={0x1c, 0x4e, {0x7, 0xf3, 0x9, 0x7}}, &(0x7f0000000100), 0x1000) 06:03:38 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, 0x0, &(0x7f0000000280)=0xe6) [ 486.082012][ T1988] block nbd1: Attempted send on invalid socket [ 486.088517][ T1988] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 486.127858][T17225] VFS: could not find a valid V7 on nbd1. 06:03:39 executing program 0: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0x541b, 0x0) 06:03:39 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)}, {&(0x7f00000001c0)="cb85c927876acf72c915cea3a6d4c48ca0f67a89a050", 0x16}], 0x2}, 0x0) 06:03:39 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {0x0}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:03:39 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:03:39 executing program 1: r0 = syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000100)=ANY=[@ANYBLOB="2f6465762f6e5a0c52cbc3f82105d9af0b707a74a226a1384d9f0c5ff341aced45428f75614052011d74451d81c16a1ce2960b07a8"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) utime(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={0x7, 0xc12}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(r4, 0xee00, 0x0) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(r8, 0xee00, 0x0) getgroups(0x2, &(0x7f0000000280)=[r4, r8]) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000010002000000000002000600", @ANYRES32=0x0, @ANYBLOB="56010100", @ANYRES32, @ANYBLOB="040003000000000010000000000000002000000000000000"], 0x34, 0x2) r9 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$KVM_CREATE_VM(r9, 0xae03, 0x28) r10 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$KVM_CREATE_VM(r10, 0xae03, 0x28) r11 = syz_open_dev$vcsu(&(0x7f0000000c00), 0xddc, 0x4000) r12 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$KVM_CREATE_VM(r12, 0xae03, 0x28) sendmsg$netlink(r5, &(0x7f0000000d00)={&(0x7f0000000380)=@proc={0x10, 0x0, 0x25dfdbfe, 0x40000000}, 0xc, &(0x7f0000000b80)=[{&(0x7f00000003c0)={0x32c, 0x14, 0x100, 0x70bd26, 0x25dfdbfe, "", [@typed={0x14, 0x57, 0x0, 0x0, @ipv6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, @nested={0x4, 0xa}, @nested={0x2fc, 0x4d, 0x0, 0x1, [@generic="71001b4ce50c00153c8fc99db84c50dd1e1abc6a2fa213e5b314adf4b9950a7bd58ec9e2b2ada27f2f14ccd32cc3653120b3f5cc88abb9eb96227f29ac921c55991eb97a51fb4f352b15af9a0511ec2fecb1848408e19ffb651d327badfb86161251ec5b622e39cad4625bb807e500d909037dca65bb30a0d7f3b4a9c6c08c1dd2ae61aa7957a70710fcc8829a1826c851ec8202956f55dc9bb9d0fbbbdf6de0e9b85ee1e863dd1b52dda72335c36f5aea4976949dae281239422de090aab3dc9eb4205e754aba0b3f138aa6a2e5f48479317df2296ac8aa9d3e3280ec832409f6", @typed={0x8, 0x15, 0x0, 0x0, @pid=r2}, @typed={0x102, 0x2, 0x0, 0x0, @binary="d4301d8217961768c95f275a160e95faa1fc0ed64d6481089fc182039d5eeba58070292d9167850e9ef78c514d7cc5ddcb07d9cbb79c81b0f4f86eecbd2e7c546ed44f4660ef19710dc01b5144dfe27be3a5c0f8be4605c6ad15600e37c5af94c7613042339b2f0dffb05ee3ac1f5aa50714aadb5fd9119c92bddd31662fb4e14bf64d7f3cb3f4a2573b451325d75d1b141bc0e0dcefa6645809c4fd7ccb0099c2ef4c6cd449b79dba044ca2a19184686fecd01e8d32dfb6e2e5caf30d46d8605ae7b5ee12a3a635f97f72b7aa2d890b6723c9e9b88812dd853aaa22dea84ba22aa1347ec9821aad8a16fa98f2217b4b36c3f4b2228585ec4c371f3666c3"}, @typed={0x4, 0x44}, @generic="bc54beb95c186e44125786bf6170504fb4e18309d7e232289b9ef0cd8c821437", @typed={0x8, 0x92, 0x0, 0x0, @u32=0x6}, @generic="c7a79ea0393741b67e99b98fad98fcb2a8dd2cdaca26f921c1547cfff2a605be5c425677b3185b87a3cdaf84cb5fe44780e222aca41878b79b2f33d1f65c89025840b15f900af4cb61d59540c3d52bf69e8ac4d664f2a5412df73ace9511dc2c25d17a07a4ca0f69fbed4b4773544e73441cbaed80f99e27a896b95b48334dc6fdb3183d9dd2d80e1fe163d8b21aaa42447e28ae293877374a5bb9c9ce42415f8f22d94ebc443b05709c8fada3c9ee1e5fb6675b12b5775f02650494a5dd1600a1d8c9f35a54fad61e5e81fbd3d2837610808a", @typed={0xc, 0x5, 0x0, 0x0, @u64=0x3ff}]}, @typed={0x7, 0x7d, 0x0, 0x0, @str='}\\\x00'}]}, 0x32c}, {&(0x7f0000000700)={0x134, 0x2f, 0x400, 0x70bd29, 0x25dfdbff, "", [@generic="c52e141a723d5334e0348e1b63508ad63f", @typed={0x8, 0x3b, 0x0, 0x0, @u32=0x100}, @nested={0x1c, 0x16, 0x0, 0x1, [@typed={0x8, 0x1e, 0x0, 0x0, @pid}, @typed={0x8, 0x5e, 0x0, 0x0, @fd=r9}, @typed={0x8, 0x3b, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}]}, @generic="4179049e2dcddf210ae2984d9b2d50ce7df8366ec7851381bf06c06a789fee61dfc9017d1deab8279f6d7402b0ed88ad0f6b1019cab64a870c9d8d65c1d03ace063f6cfef9d4ad8370986d9b3947f84d016d79d96ab31a13047b5d1086797c5621fdbf8e0d082a1efa71713122126f75ff9896e4eba2ea8505a393b0ad14cc822785eb396f306076af885165d0375b4b0194a273e12311f4b6baad477a19a07670005889a3f16ca4ecc433dfa224cb847afeafb5a5ef8ab030a1635908e4052c019810b1c24e37ab5db684380109b5faa0c20c2dcfdda7fb5830a55e0cb37e2b04e6adcbbadfc9283dceaa0ea4e1"]}, 0x134}, {&(0x7f0000000840)={0x194, 0x36, 0x8, 0x70bd2b, 0x25dfdbfe, "", [@generic="6e5af68cb4281d36276541930309cff55ae8747a3d052800b49bc5a62d530bdc84515829be8f638f2d754964835bea4a10e5bf44", @generic="d59a2be1e1242bf92b12203701f1172fc70ee179d2cafef10d76fa05c8a82f2d0b5ec66d012dfe2f476077af1edc316bc45c94d3aff02934d9d009db970ff8114fb4e5506b0cd659b2bf50215d7f4c7b1d23c8d4f3441a4f611da29fa351961b34872289d65304b4438e4d3a275e", @generic="c986bdce984d33ed83426d6a86964759004207c2e8b37e00b4d49976a758bfe63bfe2cca5931a2c6ee2d607483f498895fdfbb7fc6ea08d6ab6d7e297bd66dc859aea0e67b4b5590b993e7b3594e53c4b0c4cb27cde99f435ee8b6a782888b14b97db3dc86cf85e52a8b9f2da080cf04830083414e431480b6312e7cf35551fa03d2843bd6d0762b7bb64d765572b616bf263d3dbef6c7aa1b3775bfd86e85a265568cb1b656a8e76d8c25d62ebff650d2f17ac76df84fbf8b6f30748f2e42aeca6487d879cded90272a782c3bc6e99363ca09d660ddb2e2e83c19f561c64298"]}, 0x194}, {&(0x7f0000000a00)={0x4c, 0x25, 0x1, 0x70bd2d, 0x25dfdbfe, "", [@generic="027f995dcc810b658b0cc9346784fcdb3bf7eff0aabca8ed1cd951552981cd5ea3d6b770fc80012739c0d2e6d8b83696c44f919a908ceec782"]}, 0x4c}, {&(0x7f0000000a80)={0xe8, 0x19, 0x4, 0x70bd26, 0x25dfdbfc, "", [@generic="429d5849d904f55228242fb1efcb45f7f86869d1bf36716f02ebdd90848085ed97ccfd7d28ca5db4a5e14d02c240849cdef936d31e7938d17c92e0b88a5f4446551dd3a62d6ae73968ba118a24111fefb463e5d894950f38ad5cab208b17416418daff4bf61eb614847ed03deda9a800e96e79b82ef74a900bb42b85a971e27f5437bb9e551608ac2f8c314a28c2c7a8805856d07fdcc43c3397e226092349f000af38861b09e1078e006f1e998a976953c4a83b100ff5", @typed={0x14, 0x82, 0x0, 0x0, @ipv6=@empty}, @typed={0x8, 0x8b, 0x0, 0x0, @uid=r7}, @nested={0x4, 0x90}]}, 0xe8}], 0x5, &(0x7f0000000d40)=ANY=[@ANYBLOB="140000000100000001000000", @ANYRES32, @ANYRES32=r5, @ANYBLOB="2000000001017839f25df77aea5e8b980ede00000001000000", @ANYRES32, @ANYRES32=r5, @ANYRES32=r9, @ANYRES32, @ANYRES32=r5, @ANYBLOB="180000000100000002000000", @ANYRES32=r6, @ANYRES32=r3, @ANYRES32=0xee00, @ANYBLOB="180000000100000001000000", @ANYRES32=r10, @ANYRES32=r11, @ANYRES32, @ANYBLOB="180000000100000001000000", @ANYRES32=r0, @ANYRES32=r5, @ANYRES32=r1, @ANYBLOB="200000000100000001000000", @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r12, @ANYRES32=r0], 0x9c, 0x800}, 0x40) sendmsg$AUDIT_SIGNAL_INFO(r5, &(0x7f0000000340)={&(0x7f0000000200), 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x3f2, 0x100, 0x70bd26, 0x25dfdbfb, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0x4c804}, 0x0) 06:03:39 executing program 5: syz_open_dev$sndpcmp(&(0x7f0000000140), 0x7f, 0x88200) [ 487.886830][T17238] IPVS: ftp: loaded support on port[0] = 21 [ 488.008467][T17244] IPVS: ftp: loaded support on port[0] = 21 06:03:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)}, {&(0x7f00000001c0)="cb85c927876acf72c915cea3a6d4c48ca0f67a89a050", 0x16}], 0x2}, 0x0) 06:03:40 executing program 5: r0 = msgget(0x1, 0x0) msgctl$IPC_STAT(0x0, 0x2, 0x0) msgctl$MSG_INFO(r0, 0xc, &(0x7f0000001180)=""/125) fork() msgget(0x1, 0xe2) msgget$private(0x0, 0x0) 06:03:40 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x0, 0x0) 06:03:40 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000a40), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000200)) 06:03:40 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x3, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:03:41 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) [ 489.083260][ T1988] blk_update_request: I/O error, dev loop1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 489.112453][T17296] VFS: unable to read V7 FS superblock on device loop1. [ 489.119591][T17296] VFS: could not find a valid V7 on loop1. 06:03:41 executing program 0: syz_genetlink_get_family_id$l2tp(&(0x7f0000000980), 0xffffffffffffffff) 06:03:41 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) 06:03:41 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="480000001400812cf1e14319147fd108021100b9eb1b7c8687", 0x19}, {&(0x7f00000001c0)="cb85c927876acf72c915cea3a6d4c48ca0f67a89a050", 0x16}], 0x2}, 0x0) 06:03:41 executing program 5: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, 0x0, 0x0) [ 489.663997][T17305] IPVS: ftp: loaded support on port[0] = 21 [ 489.876236][T17308] IPVS: ftp: loaded support on port[0] = 21 [ 490.030728][ T2038] block nbd1: Attempted send on invalid socket [ 490.038263][ T2038] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 490.067965][T17325] VFS: could not find a valid V7 on nbd1. 06:03:42 executing program 5: ioctl$SNDRV_PCM_IOCTL_READI_FRAMES(0xffffffffffffffff, 0x80184151, 0x0) 06:03:42 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x3, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:03:42 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) 06:03:42 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="480000001400812cf1e14319147fd108021100b9eb1b7c8687", 0x19}, {&(0x7f00000001c0)="cb85c927876acf72c915cea3a6d4c48ca0f67a89a050", 0x16}], 0x2}, 0x0) 06:03:43 executing program 0: setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000000)=@req={0x8, 0x7f, 0x7fff, 0x241aa5b0}, 0x10) r0 = accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) connect$packet(r0, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x1, 0x1, 0x6, @random="16bcfe48ba2f"}, 0x14) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x4}, 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x10000, 0x30}, &(0x7f0000000140)=0xc) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000180)={r1, 0x4}, &(0x7f00000001c0)=0xc) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000200)={r2, @in6={{0xa, 0x4e22, 0x7f, @mcast2, 0x5}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000640)={r2, @in6={{0xa, 0x4e23, 0x3ff, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0x84) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000009c0)={'sit0\x00', &(0x7f0000000940)={'syztnl1\x00', 0x0, 0x2f, 0x8, 0x7f, 0x9, 0x0, @remote, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7810, 0x8, 0x3b, 0x5}}) [ 491.061833][T17364] IPVS: ftp: loaded support on port[0] = 21 06:03:43 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000004c0)=@assoc_value, &(0x7f0000000500)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000004c0)={0xfffe}, &(0x7f0000000500)=0x20) [ 491.308854][ T2038] block nbd1: Attempted send on invalid socket [ 491.317552][ T2038] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 491.328975][T17385] VFS: could not find a valid V7 on nbd1. [ 491.339552][ T2038] block nbd1: Attempted send on invalid socket [ 491.348812][ T2038] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 491.360362][T17385] VFS: could not find a valid V7 on nbd1. 06:03:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="480000001400812cf1e14319147fd108021100b9eb1b7c8687", 0x19}, {&(0x7f00000001c0)="cb85c927876acf72c915cea3a6d4c48ca0f67a89a050", 0x16}], 0x2}, 0x0) 06:03:43 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:03:43 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x3, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:03:43 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x1, 0x0, 0x0, 0x0, 0x1}, 0x28de) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) [ 491.925393][T17399] sctp: [Deprecated]: syz-executor.5 (pid 17399) Use of struct sctp_assoc_value in delayed_ack socket option. [ 491.925393][T17399] Use struct sctp_sack_info instead 06:03:44 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000004c0), &(0x7f0000000500)=0x20) 06:03:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="480000001400812cf1e14319147fd108021100b9eb1b7c8687811b59d0441c02000000461eb8", 0x26}, {&(0x7f00000001c0)="cb85c927876acf72c915cea3a6d4c48ca0f67a89a050", 0x16}], 0x2}, 0x0) [ 492.212721][T17403] IPVS: ftp: loaded support on port[0] = 21 [ 492.338055][T17404] IPVS: ftp: loaded support on port[0] = 21 06:03:44 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0x10, 0x0) [ 492.622876][ T2038] block nbd1: Attempted send on invalid socket [ 492.629186][ T2038] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 492.659076][T17427] VFS: could not find a valid V7 on nbd1. [ 492.750437][ T2038] block nbd1: Attempted send on invalid socket [ 492.757154][ T2038] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 492.772100][T17430] VFS: could not find a valid V7 on nbd1. 06:03:45 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x100, 0x100) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='/dev/njd0\x00'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) r1 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_int(r1, 0x29, 0x21, &(0x7f0000000180)=0x101, 0x4) r2 = dup(r1) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e25, 0x0, @empty}, 0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@private0={0xfc, 0x0, '\x00', 0x1}, 0x0, 0x2, 0xff, 0x4, 0xc8, 0x7f}, &(0x7f0000000200)=0x20) getpeername$inet6(r2, 0x0, &(0x7f0000000140)) fanotify_mark(r0, 0x40, 0x8001023, r2, &(0x7f00000000c0)='./file0\x00') 06:03:45 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x723}, 0x14}}, 0x0) 06:03:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="480000001400812cf1e14319147fd108021100b9eb1b7c8687811b59d0441c02000000461eb8", 0x26}, {&(0x7f00000001c0)="cb85c927876acf72c915cea3a6d4c48ca0f67a89a050", 0x16}], 0x2}, 0x0) 06:03:45 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x4000, 0x0) 06:03:45 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:03:45 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, 0x0) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:03:46 executing program 1: ioctl$CHAR_RAW_BSZGET(0xffffffffffffffff, 0x80041270, &(0x7f0000000040)) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r1) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(r3, 0xee00, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00)={0x0, 0x0}, &(0x7f0000004c40)=0xc) mount$9p_unix(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x10000, &(0x7f0000004c80)={'trans=unix,', {[{@access_uid={'access', 0x3d, r1}}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@cache_loose}], [{@hash}, {@euid_eq={'euid', 0x3d, r4}}, {@obj_type={'obj_type', 0x3d, '}$@%.\x0e]'}}, {@fowner_lt}, {@seclabel}, {@dont_appraise}, {@obj_role={'obj_role', 0x3d, '/dev/nbd'}}]}}) write$char_raw(0xffffffffffffffff, &(0x7f0000000200)={"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"}, 0x4a00) [ 494.055849][T17471] IPVS: ftp: loaded support on port[0] = 21 06:03:46 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, 0x0) ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000980), 0xffffffffffffffff) 06:03:46 executing program 5: syz_open_dev$dri(&(0x7f00000000c0), 0x0, 0x4ce80) 06:03:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="480000001400812cf1e14319147fd108021100b9eb1b7c8687811b59d0441c02000000461eb8", 0x26}, {&(0x7f00000001c0)="cb85c927876acf72c915cea3a6d4c48ca0f67a89a050", 0x16}], 0x2}, 0x0) 06:03:46 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) [ 494.786265][T17505] 9pnet: p9_fd_create_unix (17505): problem connecting socket: ./file0: -13 [ 494.960952][T17475] IPVS: ftp: loaded support on port[0] = 21 06:03:47 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@sndrcv={0x30}], 0x30}, 0x0) [ 495.014920][ T1988] block nbd1: Attempted send on invalid socket [ 495.021225][ T1988] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 495.045033][T17496] VFS: could not find a valid V7 on nbd1. 06:03:47 executing program 0: epoll_pwait(0xffffffffffffffff, 0x0, 0x0, 0x7ff, &(0x7f0000000200)={[0x9]}, 0x8) [ 495.087953][ T2038] block nbd1: Attempted send on invalid socket [ 495.094459][ T2038] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 495.106290][T17505] VFS: could not find a valid V7 on nbd1. [ 495.161453][T17505] 9pnet: p9_fd_create_unix (17505): problem connecting socket: ./file0: -13 06:03:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="480000001400812cf1e14319147fd108021100b9eb1b7c8687811b59d0441c02000000461eb8860000000002", 0x2c}, {&(0x7f00000001c0)="cb85c927876acf72c915cea3a6d4c48ca0f67a89a050", 0x16}], 0x2}, 0x0) 06:03:47 executing program 1: mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) 06:03:47 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x1}, 0x14}}, 0x0) 06:03:48 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, 0x0) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:03:48 executing program 0: syz_open_dev$sndpcmp(&(0x7f0000000140), 0x0, 0x88200) 06:03:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="480000001400812cf1e14319147fd108021100b9eb1b7c8687811b59d0441c02000000461eb8860000000002", 0x2c}, {&(0x7f00000001c0)="cb85c927876acf72c915cea3a6d4c48ca0f67a89a050", 0x16}], 0x2}, 0x0) [ 496.335926][T17512] IPVS: ftp: loaded support on port[0] = 21 06:03:48 executing program 1: r0 = syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0xa0000, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="2f6465762f6e62643000f5627f5811fde6d454401e893e7dff4f0e04a2c67251a9b2491071792198cf0ccebec79c2df147d250845ea9c807cdee1ca22f97c8f36000000000001804840f9ddcec696fd8958ee85986c22d91681e7f2a196fc97526c71ad0e9555fd267422e7902a4"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) openat(r0, &(0x7f0000000900)='./file0\x00', 0x80000, 0x110) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$UFFDIO_ZEROPAGE(0xffffffffffffffff, 0xc020aa04, &(0x7f00000008c0)={{&(0x7f0000ffe000/0x2000)=nil, 0x2000}}) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3001000010000104000000000400000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=r3, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="e68d9028d200100000e88cf2fa6a39e3b5c04defd2df4b1399f1a49616b251048a4662ea56b2dcb231560900000000000000"], 0x130}}, 0x0) sendmsg(r6, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000480)="6111e88a5467baa3ab034779a56328f1b5821e43c4172126690933aed12982f350df320a9ce9110614059b826534511126ba018605d9cf31d64786e9590b611a57762a02b70a36f0f8f16277e6de717489235de45c75aa8a644623b235fd0207ba5af9590b98b726275a37cc83ab900950ad7975be72981a8f41c75d34e9b03d8ce17f3d175e8f918465342c4d38ea569b8ada557e2816f19e005c43babf66b5a3b0fa3c76f43c57cb1c200b140be6a95e4a20edea6a29109a9e53aec9177e8460d6a31e2795822e8c63ae83c297be0e92c195b844169089aeb1521073ef07227e9c234ffa67090ce9e3ce8454aea078afb67bf9ac53d3cf", 0xf8}, {&(0x7f0000000580)="40f00f5cd6d92e5d4f2ec504bd875740f7c45bd35f483860ae694583d6cc02fd7c004f3d1aa307a8a5d8492e82c918b64e0cfea50377f5e6795d44e45b4847331b2272498530e6f8d448f7a6ddd0fa5c4df6c66f1efbc8c0d84ba4f9f5c555750488f996e5eeccda4a12145d225368b8b3734951ca3ae3a85e481b71e6bc55f001d569ad0020", 0x86}, {&(0x7f0000000180)}, {&(0x7f0000000640)="6e16cd5964495d0122d5f278264f3c5094ce10f3a4e127127c41e39a1efeef47d6554befd92bd854d18acc6e67a12500cf2a34d009dfd22607ca9e59c255fe7dd794be731069a04958236588c59aa192ff66b889e075c5daadab1ecacd5514bc826c2301339558ba4a60df2386ee788b857812f30d25676fe171f644213c47f5b6c63b76b4d48b57f29867701c114c0e0be87bb41e6b625f90f940942ee0a76e0df59691856affe7f797f3e207e537547732dcab5c136df7027a4e4749f7fa9c38041cf1f65bba9de9d4a605", 0xcc}, {&(0x7f0000000740)="3ac2bbf726449f7ebfd130e353153f0647a4f90cce1b67b1eb4c680d0f9f62333ac72c871689ddf63ca2aa6ced4547592286ec57d85635267bd4ba22fc3a485d24a2b69cb7b36fab77589900f43031862d48863188d983539c9c9f9fc7f793a97aac1c79fe24d62ee00f2c832679ff584c272a610053b56fdc76b543131834ee190c195c1ba7f919ded539a2a2a0232a3317649be4d719601c7538857348f56c065b82c867bcf2fb0d5efb5a1b9a7a2ad056a2981e08180b11cd2b92e42f8c66578f55", 0xc3}], 0x5}, 0x810) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000400)={{}, {0x1, 0x1}, [{0x2, 0x2}, {0x2, 0xfd49e5b43377e387, 0xffffffffffffffff}], {0x4, 0x3}, [{0x8, 0x35bd00997cf5f27, r1}, {0x8, 0x0, 0xee00}, {0x8, 0x0, r7}, {0x8, 0x2, r8}, {0x8, 0x7}], {}, {0x20, 0x4}}, 0x5c, 0x1) syz_mount_image$sysv(&(0x7f0000000940), &(0x7f0000000980)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000a40)=[{&(0x7f00000009c0)="cd1f73fbc87fababbab3f64532ef3bf49d12eaae79dfc9722159d840d42a7cf39efb3511d31a388a687ae9da0bf1cccd14d42c716d28f81af3d4e16e95713f087d1a62d6bd6370fceceab3a10b005c2fda72c06504fa3cb4c7b2c9f2dd73bf01285740c6fe2cdd5d59d2", 0x6a, 0x1}], 0x1000000, &(0x7f0000000a80)=ANY=[@ANYBLOB="c02c73797374656d2e706f7369785f61636c5f616363657373002c002c626f6e645d2c626f6e6430b6e461707072616973652c646f6e745f686173682c66736e616d653d2c7063723d30303030303030303030303030303030303032322c00"/104]) 06:03:48 executing program 5: r0 = socket$pppoe(0x18, 0x1, 0x0) ioctl$SNDRV_PCM_IOCTL_READI_FRAMES(r0, 0x80184151, 0x0) [ 496.915331][T17555] IPVS: ftp: loaded support on port[0] = 21 [ 497.005121][ T2038] block nbd0: Attempted send on invalid socket [ 497.011599][ T2038] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 497.024005][T17579] VFS: could not find a valid V7 on nbd0. 06:03:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="480000001400812cf1e14319147fd108021100b9eb1b7c8687811b59d0441c02000000461eb8860000000002", 0x2c}, {&(0x7f00000001c0)="cb85c927876acf72c915cea3a6d4c48ca0f67a89a050", 0x16}], 0x2}, 0x0) [ 497.109460][T17581] loop1: detected capacity change from 0 to 264192 [ 497.209570][T17581] VFS: unable to find oldfs superblock on device loop1 06:03:49 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:03:49 executing program 0: syz_open_dev$sndpcmp(&(0x7f0000000140), 0x0, 0x88200) 06:03:49 executing program 5: syz_genetlink_get_family_id$team(&(0x7f0000000080), 0xffffffffffffffff) socket(0x0, 0x0, 0x0) 06:03:49 executing program 0: clone3(&(0x7f00000001c0)={0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {}, &(0x7f0000000380)=""/148, 0x94, &(0x7f0000000180)=""/29, &(0x7f0000000180)}, 0x46) [ 497.828559][ T2038] block nbd0: Attempted send on invalid socket [ 497.835447][ T2038] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 497.848214][T17579] VFS: could not find a valid V7 on nbd0. 06:03:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="480000001400812cf1e14319147fd108021100b9eb1b7c8687811b59d0441c02000000461eb8860000000002000000", 0x2f}, {&(0x7f00000001c0)="cb85c927876acf72c915cea3a6d4c48ca0f67a89a050", 0x16}], 0x2}, 0x0) [ 497.935097][T17600] IPVS: ftp: loaded support on port[0] = 21 [ 498.076447][T17604] loop1: detected capacity change from 0 to 264192 [ 498.187210][T17604] VFS: unable to find oldfs superblock on device loop1 06:03:50 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, 0x0) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:03:50 executing program 0: write$snddsp(0xffffffffffffffff, 0x0, 0x0) 06:03:50 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:03:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="480000001400812cf1e14319147fd108021100b9eb1b7c8687811b59d0441c02000000461eb8860000000002000000", 0x2f}, {&(0x7f00000001c0)="cb85c927876acf72c915cea3a6d4c48ca0f67a89a050", 0x16}], 0x2}, 0x0) [ 499.138966][T17654] IPVS: ftp: loaded support on port[0] = 21 06:03:51 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f7303dfda38b1f956746e18461bcedc463763b9"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) 06:03:51 executing program 0: msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000300)=""/221) 06:03:51 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000001180)={0x0, 0x4c, &(0x7f0000001080)=[@in={0x2, 0x4e20, @rand_addr=0x64010101}, @in6={0xa, 0x0, 0xfffffff0, @private0}, @in={0x2, 0x0, @broadcast}, @in={0x2, 0x0, @multicast2}]}, &(0x7f00000011c0)=0x10) 06:03:52 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x0, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:03:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="480000001400812cf1e14319147fd108021100b9eb1b7c8687811b59d0441c02000000461eb8860000000002000000", 0x2f}, {&(0x7f00000001c0)="cb85c927876acf72c915cea3a6d4c48ca0f67a89a050", 0x16}], 0x2}, 0x0) 06:03:52 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={0x0}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:03:52 executing program 5: syz_open_dev$usbfs(&(0x7f0000000000), 0x17e4, 0x0) 06:03:52 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000000180)=0x101, 0x4) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e25, 0x0, @empty}, 0x1c) getpeername$inet6(r1, 0x0, &(0x7f0000000140)) openat(r1, &(0x7f0000000000)='./file0\x00', 0xa040, 0x18) 06:03:52 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000140)={0x0}) [ 500.614532][T17698] IPVS: ftp: loaded support on port[0] = 21 06:03:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="480000001400812cf1e14319147fd108021100b9eb1b7c8687811b59d0441c02000000461eb88600000000020000000000", 0x31}, {&(0x7f00000001c0)="cb85c927876acf72c915cea3a6d4c48ca0f67a89a050", 0x16}], 0x2}, 0x0) [ 501.030207][T17722] IPVS: ftp: loaded support on port[0] = 21 06:03:53 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000640)={0x0, @in={{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x84) 06:03:53 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x0, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:03:53 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000180), 0xc) 06:03:53 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x1, 0x0, 0x0, 0x220000, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) 06:03:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="480000001400812cf1e14319147fd108021100b9eb1b7c8687811b59d0441c02000000461eb88600000000020000000000", 0x31}, {&(0x7f00000001c0)="cb85c927876acf72c915cea3a6d4c48ca0f67a89a050", 0x16}], 0x2}, 0x0) 06:03:54 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0x801c581f, 0x0) 06:03:54 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000040)=@assoc_value, 0x8) [ 502.290796][T17760] IPVS: ftp: loaded support on port[0] = 21 06:03:54 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={0x0}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) [ 502.533514][ T2038] block nbd1: Attempted send on invalid socket [ 502.539943][ T2038] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 502.561352][T17764] VFS: could not find a valid V7 on nbd1. [ 502.985844][T17784] sctp: [Deprecated]: syz-executor.0 (pid 17784) Use of struct sctp_assoc_value in delayed_ack socket option. [ 502.985844][T17784] Use struct sctp_sack_info instead 06:03:55 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x0, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:03:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="480000001400812cf1e14319147fd108021100b9eb1b7c8687811b59d0441c02000000461eb88600000000020000000000", 0x31}, {&(0x7f00000001c0)="cb85c927876acf72c915cea3a6d4c48ca0f67a89a050", 0x16}], 0x2}, 0x0) 06:03:55 executing program 5: socketpair(0x29, 0x5, 0x0, &(0x7f0000000080)) [ 503.291824][T17793] IPVS: ftp: loaded support on port[0] = 21 06:03:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000780), &(0x7f00000007c0)=0xc) 06:03:55 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f0000000300)={@local}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae03, 0x28) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae03, 0x28) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000001380)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f00000012c0)=ANY=[@ANYRES64=r3]) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000000240)={r3, 0x9}) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x4, 0x4) setsockopt$inet6_int(r4, 0x29, 0x21, &(0x7f0000000180)=0x101, 0x4) r5 = dup(r4) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x4e25, 0x0, @empty}, 0x1c) getpeername$inet6(r5, 0x0, &(0x7f0000000140)) r6 = accept4$netrom(0xffffffffffffffff, &(0x7f0000001240)={{}, [@netrom, @rose, @remote, @default, @netrom, @bcast, @bcast, @netrom]}, &(0x7f0000001300)=0x48, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000001340)={'macvlan0\x00'}) openat(r5, &(0x7f0000000080)='./file0\x00', 0x40, 0x8) mount(&(0x7f0000000000)=@nullb, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ocfs2\x00', 0x18000, 0x0) symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='./file0\x00') [ 503.775170][T17801] IPVS: ftp: loaded support on port[0] = 21 06:03:56 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={0x0}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:03:56 executing program 5: socketpair(0x21, 0x0, 0x2, &(0x7f0000000040)) [ 504.296718][T17850] (syz-executor.1,17850,0):ocfs2_fill_super:1001 ERROR: superblock probe failed! [ 504.306361][T17850] (syz-executor.1,17850,0):ocfs2_fill_super:1188 ERROR: status = -22 06:03:56 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000a40), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(r0, 0xc0884113, 0x0) [ 504.568935][T17852] (syz-executor.1,17852,0):ocfs2_fill_super:1001 ERROR: superblock probe failed! [ 504.578710][T17852] (syz-executor.1,17852,0):ocfs2_fill_super:1188 ERROR: status = -22 06:03:56 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:03:56 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty}, 0x1c, &(0x7f0000000100)=[{0x0}, {0x0}], 0x2}, 0x0) [ 504.776128][T17860] IPVS: ftp: loaded support on port[0] = 21 06:03:57 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f0000000380)={{}, {0x1, 0x1}, [{0x2, 0x0, 0xffffffffffffffff}], {0x4, 0x5}, [{0x8, 0x4}], {}, {0x20, 0x1}}, 0x34, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x8000, 0x0) setsockopt$PNPIPE_INITSTATE(0xffffffffffffffff, 0x113, 0x4, &(0x7f0000000100)=0x1, 0x4) 06:03:57 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000500), 0x8) 06:03:57 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$SMC_PNETID_FLUSH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)={0x14, r1, 0x1}, 0x14}}, 0x0) [ 505.311898][T17874] IPVS: ftp: loaded support on port[0] = 21 06:03:57 executing program 0: r0 = io_uring_setup(0x65d1, &(0x7f0000000340)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x0) 06:03:58 executing program 5: sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0xf4c77d619c51b30f) 06:03:58 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000001180)={0x0, 0x58, &(0x7f0000001080)=[@in={0x2, 0x4e20, @rand_addr=0x64010101}, @in6={0xa, 0x0, 0x0, @private0}, @in={0x2, 0x0, @broadcast}, @in6={0xa, 0x0, 0x0, @mcast2}]}, &(0x7f00000011c0)=0x10) 06:03:58 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000000180)=0x101, 0x4) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e25, 0x0, @empty}, 0x1c) getpeername$inet6(r1, 0x0, &(0x7f0000000140)) name_to_handle_at(r1, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=@GFS2_SMALL_FH_SIZE={0x10, 0x4, {0xfffeffff, 0x2, 0x2, 0x7}}, &(0x7f0000000100), 0x1000) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) 06:03:58 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) ptrace$getregset(0x4205, r2, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r2, r0, 0x2, r1, r1) 06:03:58 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:03:58 executing program 0: clock_nanosleep(0x7, 0x0, &(0x7f0000000000)={0x0, 0x989680}, 0x0) 06:03:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FBIOBLANK(r0, 0x4611, 0x2) 06:03:58 executing program 4: socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) [ 506.961066][ T1988] block nbd1: Attempted send on invalid socket [ 506.967938][ T1988] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 506.980167][T17932] IPVS: ftp: loaded support on port[0] = 21 [ 506.991927][T17937] IPVS: ftp: loaded support on port[0] = 21 [ 507.021054][T17933] VFS: could not find a valid V7 on nbd1. 06:03:59 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000640)={0x0, @in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0x84) 06:03:59 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=@random={'btrfs.', '%:}#/[(]\x00'}) 06:03:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FBIOBLANK(r0, 0x4611, 0x2) 06:04:00 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000340)={0x0, 0x0, 0x0}, &(0x7f0000000380)=0x10) 06:04:00 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) ptrace$getregset(0x4205, r2, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r2, r0, 0x2, r1, r1) [ 508.253948][ T1988] block nbd1: Attempted send on invalid socket [ 508.260282][ T1988] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 508.283058][T17996] VFS: could not find a valid V7 on nbd1. 06:04:00 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000080)={0x0, 0x3fff8000}, 0x8) 06:04:00 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={0x0}}, 0x0) [ 508.327717][ T2038] block nbd1: Attempted send on invalid socket [ 508.334813][ T2038] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 508.360320][T17996] VFS: could not find a valid V7 on nbd1. [ 508.601787][T18004] IPVS: ftp: loaded support on port[0] = 21 06:04:00 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae03, 0x28) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000200)=""/234, 0xea}], 0x1, 0x3104, 0xeff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') [ 509.540539][ T1988] block nbd1: Attempted send on invalid socket [ 509.547732][ T1988] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 509.590311][T18033] VFS: could not find a valid V7 on nbd1. [ 509.668996][ T1988] block nbd1: Attempted send on invalid socket [ 509.677485][ T1988] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 509.703474][T18043] VFS: could not find a valid V7 on nbd1. [ 509.858307][ T3124] ieee802154 phy0 wpan0: encryption failed: -22 [ 509.865843][ T3124] ieee802154 phy1 wpan1: encryption failed: -22 06:04:03 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:04:03 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000100)=@framed, &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:04:03 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 06:04:03 executing program 5: socketpair(0x2, 0x3, 0x2, &(0x7f0000000200)) 06:04:03 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x3008000, 0x0) 06:04:03 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) ptrace$getregset(0x4205, r2, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r2, r0, 0x2, r1, r1) 06:04:04 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000000), 0x8) 06:04:04 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0x5421, &(0x7f0000000100)) 06:04:04 executing program 1: r0 = syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$btrfs_control(0xffffff9c, &(0x7f0000000040), 0x151000, 0x0) fsconfig$FSCONFIG_SET_PATH(r1, 0x3, &(0x7f00000000c0)='@&\x00', &(0x7f0000000100)='./file0\x00', r0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) 06:04:04 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000018c0), 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001ac0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="d8000000", @ANYRES16=r1, @ANYBLOB="010000000000000000000a0000000c0003eb"], 0xd8}}, 0x0) [ 512.287321][T18070] IPVS: ftp: loaded support on port[0] = 21 06:04:04 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) [ 512.567628][T18091] IPVS: ftp: loaded support on port[0] = 21 [ 512.858123][ T1988] block nbd1: Attempted send on invalid socket [ 512.864634][ T1988] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 512.901294][T18102] VFS: could not find a valid V7 on nbd1. 06:04:05 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000900), 0x8) [ 513.282517][T18127] IPVS: ftp: loaded support on port[0] = 21 [ 513.312623][T18126] netlink: 184 bytes leftover after parsing attributes in process `syz-executor.4'. 06:04:05 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000b40)) [ 513.393657][T18130] netlink: 184 bytes leftover after parsing attributes in process `syz-executor.4'. 06:04:05 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f0000000040)='./file0\x00', 0x6, 0x40, 0x0, 0x22840f9, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) 06:04:05 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:04:05 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, 0x0, 0x0, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:04:05 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in={{0x2, 0x0, @multicast2}}}, &(0x7f0000000200)=0x90) 06:04:06 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0xe}, 0x14}}, 0x0) [ 514.065643][ T2038] block nbd1: Attempted send on invalid socket [ 514.072142][ T2038] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 514.116151][T18157] VFS: could not find a valid V7 on nbd1. 06:04:06 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x400, 0x0) 06:04:06 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) mount(&(0x7f0000001b40)=@sr0, &(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)='jffs2\x00', 0x81, &(0x7f0000001c00)='hpfs\x00') syz_mount_image$hpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x4, 0x4, &(0x7f0000000180)=[{&(0x7f0000000200)="b3021c1a795a7751596ae2daeb2a87b648d3166b501f701f8f4ee94e568a7be6f49a83f111d4039989cb39f7e5646f9b0f63139e55d0aaed9cc66762bbe3d9cde316e17194db3b8417d2f73587878ecbe21353ad826e49c74e0c1ff5a772dda4896afaf872510a85b3eb4650a36628807f7c5e13810f8f64e2df166fdc2c9ae7c568b9213698e4028c1725097ed2764d892234e6e93b407580984900531c87200da0647a38d4f2a43e2a44ec6bb3b7381bae61fc5d4470215d2f173f0a79445198c17575d15e327186d897805a4a851ef491", 0xd2, 0x1e}, {&(0x7f0000000300)="0973f20a637faa3aeda903bea8314651cfd8c3ea2a7cf9c3ec705dc680d15f678b0e2b70e3437387cb2e21893a1f16b870c4b425ad8d115f86278f9962e8c1bf8fe432db420df13c0c0799037adb58d358abd0e01d8fd64b6f0d0232e6da48c759c962ef3262ae4726", 0x69, 0x10000}, {&(0x7f0000000100)="9dd393bbb631c15bd8596c931bcfe135fca6b71dac05de27cbd0c9103515cdab570565e3f19356f1050d6382adc492eb0043a60d2fa99c9021", 0x39, 0x9}, {&(0x7f0000000380)="3e2dd227ee1b2b03b282261f48489a57a931a4d92ebcc45c75bac277d5850fe6d114bb60b5f3de341fd5481b811d7bebc4fefdcfc8538ab102dbb128b3695dee4b2ac18068585471a740cf0568cc1010a3ef126dfd95a0a426f8f5ced62cce22a467520d47611467fcff0672e2874756d627717cdf703460d1b5ddbc848ff0254f242011d2797bb46cfaa4b92d26c887eddd9fd04140039ed088756c8bd29af8716159954fd6a6f4aff41e9d305254da8a09fbe59d1ed55ce77d58c5af09c88cfa83b36228d0679aea90827cb79f3418416f8795d7d0ab1bd22ab3d676f5ba0bbcb2ee8a3418", 0xe6, 0xfffff001}], 0x20, &(0x7f0000000480)={[{'#\\!$'}, {'/'}, {'/dev/nbd'}, {}, {'/dev/nbd'}, {'!'}, {}, {'/dev/nbd'}], [{@dont_appraise}, {@fsmagic={'fsmagic', 0x3d, 0x8}}, {@appraise}]}) execve(&(0x7f0000001580)='./file0\x00', &(0x7f0000001840)=[&(0x7f0000001800)='.:\xb4]\x00'], &(0x7f00000019c0)=[&(0x7f0000001880)='v7\x00', &(0x7f00000018c0)='euid<', &(0x7f0000001900)='&@!{@,-{:-\x00', &(0x7f0000001940)='fsmagic', &(0x7f0000001980)='@\x00']) syz_mount_image$squashfs(&(0x7f0000000500), &(0x7f0000000540)='./file0\x00', 0x9, 0x5, &(0x7f0000001740)=[{&(0x7f0000000580)="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", 0x1000, 0x9}, {&(0x7f0000001580), 0x0, 0x8}, {&(0x7f00000015c0)="610911074827e2671e706fef23dc63ec2ff5751a32e289908617e88db80e9973e38dca09aee5bacbed86da7113310243d7d754f429a57a45dc4431a38b39419fcf51a268ea633445ec8eced0e184692c42faad9f93d5d360af60dc08f578c7e7218aa97f3afad219c0d21a34a67bb64f3afc82e52ee0169bd7961f02d9c59fcdcea883cf745292676d50", 0x8a, 0x5}, {&(0x7f0000001680)="a3e4b913a465dd897eeba040398cddb0032ee9f4fe5c573457b428dabf4e5e75d2aa4e3cc32c1363a7181dcb9c30649bebdd262287db2ccbd6d45b515cbffb21064cfea683f2f65ca90582e204cd97d2e3e486fa690dd21ad3a168dc55090c40", 0x60, 0x6}, {&(0x7f0000001700)="f13d6ab020431b1072b3bd71d12f25aa2927e7ce1e0a7563ae4657a27b985f806c8d3b3e", 0x24}], 0x101000a, &(0x7f0000001780)={[{'!,}['}, {'/'}, {'appraise'}, {'{'}, {'v7\x00'}, {'appraise'}, {'#\\!$'}, {'!'}, {'///#}{('}, {'v7\x00'}], [{@euid_lt={'euid<', 0xee01}}, {@obj_user={'obj_user', 0x3d, 'dont_appraise'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) [ 514.535142][T18164] IPVS: ftp: loaded support on port[0] = 21 [ 514.559978][T18166] IPVS: ftp: loaded support on port[0] = 21 06:04:07 executing program 4: select(0x700, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x77359400}) 06:04:07 executing program 0: r0 = io_uring_setup(0x37d8, &(0x7f0000000000)) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r0, 0x7, &(0x7f0000000080), 0x1) 06:04:07 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000001800), 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) [ 515.320843][ T1988] block nbd1: Attempted send on invalid socket [ 515.327510][ T1988] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 515.360980][T18194] VFS: could not find a valid V7 on nbd1. [ 515.438555][T18209] loop1: detected capacity change from 0 to 264192 [ 515.539467][T18194] loop1: detected capacity change from 0 to 8 [ 515.589421][T18194] squashfs: Unknown parameter '!' [ 515.725159][ T1988] block nbd1: Attempted send on invalid socket [ 515.731892][ T1988] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 515.743845][T18194] VFS: could not find a valid V7 on nbd1. [ 515.796473][T18209] loop1: detected capacity change from 0 to 264192 06:04:08 executing program 1: getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x9, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r0 = syz_open_dev$audion(&(0x7f0000000100), 0x9, 0x4000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8000}, [@jmp={0x5, 0x1, 0x6, 0x6, 0xa, 0x4, 0xffffffffffffffff}, @ldst={0x2, 0x0, 0x0, 0x2, 0x4, 0xfffffffffffffffc, 0x4}]}, &(0x7f00000000c0)='syzkaller\x00', 0xfffffeff, 0xc9, &(0x7f0000000200)=""/201, 0x41000, 0x2, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000180)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x3, 0xa, 0xfff, 0x80}, 0x10}, 0x74) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) 06:04:08 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000980), 0xffffffffffffffff) 06:04:08 executing program 0: r0 = msgget(0x1, 0x421) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000080)=""/246) msgctl$MSG_INFO(r0, 0xc, &(0x7f0000001180)=""/125) fork() 06:04:08 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) [ 516.625459][ T2038] block nbd1: Attempted send on invalid socket [ 516.631975][ T2038] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 516.659105][T18257] VFS: could not find a valid V7 on nbd1. [ 516.732463][ T2038] block nbd1: Attempted send on invalid socket [ 516.741832][ T2038] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 516.770161][T18261] VFS: could not find a valid V7 on nbd1. [ 516.888273][T18262] IPVS: ftp: loaded support on port[0] = 21 06:04:10 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, 0x0, 0x0, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:04:10 executing program 5: write$midi(0xffffffffffffffff, 0x0, 0x0) 06:04:10 executing program 4: clock_nanosleep(0xb, 0x0, &(0x7f0000000000)={0x0, 0x989680}, 0x0) 06:04:10 executing program 0: select(0x34, 0x0, 0x0, 0x0, &(0x7f0000000180)) 06:04:10 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0xfffffffffffffd92, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f6465762f6e626430001413"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) 06:04:10 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}], 0x1, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) [ 518.373422][T18298] IPVS: ftp: loaded support on port[0] = 21 [ 518.454000][ T2038] block nbd0: Attempted send on invalid socket [ 518.460560][ T2038] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 518.487731][T18301] VFS: could not find a valid V7 on nbd0. 06:04:10 executing program 4: add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) 06:04:10 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x92140, 0x51) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@initdev, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000180)=0xe4) setxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000300)={{}, {0x1, 0x5}, [{0x2, 0x2, 0xee00}, {0x2, 0x6, r1}], {0x4, 0x9}, [{0x8, 0x4, 0xffffffffffffffff}], {}, {0x20, 0x2}}, 0x3c, 0x2) [ 518.908798][T18319] IPVS: ftp: loaded support on port[0] = 21 06:04:11 executing program 5: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 06:04:11 executing program 0: io_uring_setup(0x37d8, &(0x7f0000000000)={0x0, 0x0, 0x2, 0x0, 0x1e9}) 06:04:11 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}], 0x1, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:04:11 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, 0x0, 0x0, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:04:11 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000a40), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(r0, 0xc0884113, 0x0) ioctl$USBDEVFS_DISCARDURB(r0, 0x550b, &(0x7f0000000440)=0x6) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(0xffffffffffffffff, 0xc0884113, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_PD_GET(0xffffffffffffffff, 0x0, 0x20000000) inotify_init() r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x17e4, 0x0) ioctl$USBDEVFS_GETDRIVER(r1, 0x41045508, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x200002, 0x0) [ 519.841887][T18355] IPVS: ftp: loaded support on port[0] = 21 [ 519.864483][ T2038] block nbd1: Attempted send on invalid socket [ 519.870970][ T2038] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 519.919332][T18362] VFS: could not find a valid V7 on nbd1. 06:04:12 executing program 5: getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) [ 520.010109][ T1988] block nbd1: Attempted send on invalid socket [ 520.019774][ T1988] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 520.032540][T18364] VFS: could not find a valid V7 on nbd1. 06:04:12 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x20) 06:04:12 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x8001}, &(0x7f00000000c0)=0x8) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) [ 520.440621][T18391] IPVS: ftp: loaded support on port[0] = 21 06:04:12 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}], 0x1, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:04:12 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x20101, 0x0) 06:04:13 executing program 4: inotify_add_watch(0xffffffffffffffff, 0x0, 0x24000080) 06:04:13 executing program 0: syz_open_dev$audion(&(0x7f0000000900), 0x0, 0x0) 06:04:13 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000980), 0xffffffffffffffff) [ 521.391852][ T2038] block nbd1: Attempted send on invalid socket [ 521.398438][ T2038] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 06:04:13 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}], 0x3, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) [ 521.437911][T18423] IPVS: ftp: loaded support on port[0] = 21 [ 521.512680][T18424] VFS: could not find a valid V7 on nbd1. 06:04:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) 06:04:13 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYRESDEC], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) [ 522.046372][T18456] IPVS: ftp: loaded support on port[0] = 21 06:04:14 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:04:14 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000a40), 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) 06:04:14 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@authinfo={0x18}, @sndrcv={0x30}], 0x48}, 0x0) [ 522.895371][T18488] IPVS: ftp: loaded support on port[0] = 21 06:04:15 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$nvme_fabrics(0xffffff9c, &(0x7f0000002600), 0x24083, 0x0) getgroups(0x5, &(0x7f0000002540)=[0xee00, 0xee01, 0xee01, 0x0, 0xee00]) fork() r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002580), &(0x7f00000025c0)=0xc) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x10741, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae03, 0x28) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae03, 0x28) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r5) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae03, 0x28) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="2f6402000000fc050fbc927b08000000a0117845e2776712c745790a50fc807212a72bfcdc5af9b7779f4f2904aab218d7ee1d5f48fc6db11895f67f656adf8362c81f7d1f790532d4cc7e6363206a219cfe9318857b290279e8bc03b74fe675aebbf7aaf5f38bd3f3583425229b77ddeae94c0f6ba77bcd8efc69752d11805eacd964c71d7242d563e5d7877794ebee21a5cf000000"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) 06:04:15 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}], 0x3, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:04:15 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000001c0), 0x4) 06:04:15 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000180), 0x0, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000001c0)=""/108) 06:04:15 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) [ 523.676657][T18523] sctp: [Deprecated]: syz-executor.5 (pid 18523) Use of int in maxseg socket option. [ 523.676657][T18523] Use struct sctp_assoc_value instead [ 523.840475][T18524] IPVS: ftp: loaded support on port[0] = 21 06:04:15 executing program 4: r0 = socket(0x11, 0x3, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, 0x0, 0x0) [ 523.926437][T18526] IPVS: ftp: loaded support on port[0] = 21 06:04:16 executing program 0: openat$mixer(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 06:04:16 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x40) 06:04:16 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x2e4, 0x0, 0x0, 0x0, 0x0) 06:04:16 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:04:17 executing program 4: openat$mixer(0xffffffffffffff9c, &(0x7f0000000000), 0x693827ad971efc3d, 0x0) 06:04:17 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}], 0x3, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:04:17 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x7d, &(0x7f00000004c0), &(0x7f0000000500)=0x20) 06:04:17 executing program 0: socketpair(0x10, 0x3, 0x0, &(0x7f0000000200)) [ 525.275140][T18584] IPVS: ftp: loaded support on port[0] = 21 [ 525.705453][T18590] IPVS: ftp: loaded support on port[0] = 21 06:04:18 executing program 1: recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000001200)=""/253, 0xfd}, {&(0x7f00000000c0)=""/46, 0x2e}, {&(0x7f0000000100)=""/30, 0x1e}], 0x5, &(0x7f0000001300)=""/1, 0x1}, 0x2120) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000001380)) mount(&(0x7f00000013c0)=ANY=[@ANYBLOB="192dc989162a20659123b67a4b9dda891ef070ac9e0c8b52b30eb5a7b1b91163f4db3a3af1cd1e77234b9b2f00bfb7efac58e2e711b39490f0b3"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f0000001480)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001440)={&(0x7f0000001400)={0x28, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, [@ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5, 0x6, 0x1}, @ETHTOOL_A_EEE_MODES_OURS={0xc, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000845) 06:04:18 executing program 4: add_key(&(0x7f0000000100)='id_legacy\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) 06:04:18 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}], 0x3, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:04:18 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000a40), 0x0, 0x0) mmap$snddsp_control(&(0x7f0000ffc000/0x4000)=nil, 0x1000, 0xc, 0x10, r0, 0x83000000) 06:04:18 executing program 5: msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000001180)=""/125) 06:04:19 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {0x0}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) [ 526.963675][T18649] IPVS: ftp: loaded support on port[0] = 21 06:04:19 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001ac0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01002016b2820000f0ff09"], 0x24}}, 0x0) 06:04:19 executing program 1: r0 = syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, &(0x7f0000000040)='/dev/nbd', &(0x7f00000000c0)='./file1\x00', r0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) 06:04:19 executing program 4: io_uring_setup(0x37d8, &(0x7f0000000000)={0x0, 0x0, 0x2}) 06:04:19 executing program 5: syz_open_dev$audion(&(0x7f0000000000), 0xffffffffffffffff, 0x0) [ 527.613562][T18675] IPVS: ftp: loaded support on port[0] = 21 [ 527.734252][T18678] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 06:04:19 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}], 0x3, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) [ 527.816840][T18680] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 528.143769][ T2038] block nbd1: Attempted send on invalid socket [ 528.150200][ T2038] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 528.211753][T18691] VFS: could not find a valid V7 on nbd1. 06:04:20 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) 06:04:20 executing program 4: read$midi(0xffffffffffffffff, 0x0, 0x0) [ 528.298548][ T2038] block nbd1: Attempted send on invalid socket [ 528.305100][ T2038] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 528.349234][T18704] VFS: could not find a valid V7 on nbd1. 06:04:20 executing program 0: socket(0x0, 0x700, 0x0) 06:04:20 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={[{@mode={'mode', 0x3d, 0x7f}}, {@size={'size', 0x3d, [0x33, 0x32]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x2d, 0x78, 0x70]}}], [{@dont_appraise}]}) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="7a92f67ef483f5"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) [ 528.659054][T18716] IPVS: ftp: loaded support on port[0] = 21 06:04:21 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {0x0}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:04:21 executing program 0: openat2$dir(0xffffffffffffff9c, 0x0, &(0x7f00000002c0)={0x0, 0x40}, 0x18) 06:04:21 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}], 0x3, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:04:21 executing program 5: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000100), 0x8802) read$qrtrtun(r0, 0x0, 0x0) 06:04:21 executing program 4: add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) [ 529.313134][T18746] tmpfs: Bad value for 'nr_blocks' [ 529.347824][T18746] tmpfs: Bad value for 'nr_blocks' 06:04:21 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x3, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0xa8) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x16) [ 529.609242][T18751] IPVS: ftp: loaded support on port[0] = 21 06:04:21 executing program 0: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x2d0527536e1d19e7, 0x0) [ 529.929472][T18765] IPVS: ftp: loaded support on port[0] = 21 [ 530.265777][ T2038] block nbd1: Attempted send on invalid socket [ 530.272086][ T2038] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 530.299777][T18774] VFS: could not find a valid V7 on nbd1. [ 530.390600][ T2038] block nbd1: Attempted send on invalid socket [ 530.397348][ T2038] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 530.435466][T18774] VFS: could not find a valid V7 on nbd1. 06:04:22 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$audion(&(0x7f0000000000), 0x1, 0x4000) 06:04:22 executing program 4: openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000001a40), 0x0, 0x0, &(0x7f0000001b40)={&(0x7f0000001b00)={'ghash\x00'}}) 06:04:22 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {0x0}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:04:22 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) mkdir(&(0x7f0000000040)='./file1\x00', 0x1) 06:04:22 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {0x0}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:04:23 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000080)={'syztnl1\x00', 0x0}) [ 531.385461][ T2038] block nbd0: Attempted send on invalid socket [ 531.391778][ T2038] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 531.463907][T18817] IPVS: ftp: loaded support on port[0] = 21 [ 531.525538][T18816] VFS: could not find a valid V7 on nbd0. [ 531.611894][ T1988] block nbd0: Attempted send on invalid socket [ 531.618668][ T1988] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 531.633053][T18816] VFS: could not find a valid V7 on nbd0. 06:04:23 executing program 5: clock_gettime(0xda44dbaa8b5d2154, 0x0) 06:04:23 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmsg(r0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x40000042) [ 531.737822][T18824] IPVS: ftp: loaded support on port[0] = 21 06:04:24 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001580)={{{@in=@dev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000000180)=0xe4) stat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000001740)='./file0\x00', &(0x7f0000001780)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0x3, 0x6, &(0x7f0000001500)=[{&(0x7f0000000200)="443c22ab8302d677fadc6d69c8b533ee86701e8c9933044e2f34cc447a7b0ddd8ee2a0c87baf19044196b8848bb2fd6ae0861679c4b90c8643052dde343cb82f81382e4c90ea8ec5e3c75b8d6dd2dc08a17e799b9b8723c5756168a3000707c52a3b2b9b601a6024a4ead73b3cf338c9cd78969efab0ee56053b372b2cd8712256f6936d7569ff26569bfb0a86151c43a6a6aa5b3ffb05c214fe808b615c0e0e2447fb474b5d69a477ddfab6fa543052", 0xb0, 0x3}, {&(0x7f0000000100)="0a10f7abe3bd280a123f", 0xa, 0x208f}, {&(0x7f00000002c0)="1a2faad609ea043db3baa19716eb8e0993ae75343346134fc97a7d69105839289ae16753e48c3919235e10ff7a6f39c49dd3332826eeadd88c7f3c55dc4322a7bc4369429ff3a573903e2dca4ff55125d2988934ff825308687ce4f3614be07080a046adcda94acfffd4931d0138547c929af53f5ceb808b69e97ceccfc3ccd06ee1bbd60fb3a782fcbfe65ff012d1be1ef835ce046ea73d853a808474f54a04ff101f5177b578eaec1593a1e2b00e97e83a7eb566b446d1b5fcca501f3384616f2763ebb2782af108e9", 0xca, 0x1}, {&(0x7f00000003c0)="ef560bc661fc44189e4c5455a6fc17e7cde9eaabaf679a1650234faa2417fddc296eede4f09415f3cddf99b24faec3ef64563d70e6c74a8f729fa2e7337b52efc6ffc6dcc7638268d619aeb37ef12b8ad6c5a1cc72a456f585ce12c632472b16a7dbd9c64a3275ccacce5d1ea4394350f81dfe310e26be7d2185b4d0fbd4ced2bc9099a7793059eaf3ffc45168379d92191ec0cf4576f187fa276a8080d7789b", 0xa0}, {&(0x7f0000000480)="005696911daafcb1bc6cbc421ea2f05353b5d0049ae892ff13325e2a84d337e03b5d7b997451e7bc3e22fb40718988afb94039c57f0dedad34177ef399051ad5389b34994ae5a55e3b7d2d0a8bc2830e564c12b99d2756e524e1c4badb97af83f855f7d7477df7f88a3ffc97cc3c63c2b6be4afd1eef921325d74bc7b57774c739815f53f014f33b667a8f8ec6e123e5d5e97ada9c6087ad3303533db48e98f63ee23e02670b09a56d8723a27d6d982ead3409528898e5e9e8c7b9f0b35e2946f0c0e8428046fa82eec6e7ec13d7b7df55c988f66c5b0b5cea5299802903c2a9c727c6eefe7d939a83acb6e3138c8a16afdf72ca4b084d5106e295406c046438c2b9a97259036c644308713720b777d9373a1b336550d222a0694448c25af8cd96765c8d48032a32f2b8a5ef68b19e86d68d824d32fd85e63f912b63bc557de9fb9ab0b965c5bbba577ee67ec82d221b0d8d17c73440250249bb0897f408ae52d1221d809a58fe6698cb63c17ac2f69f95c91415d07c4bfc67317c81d14cc1d7b701c2490d3e4009c99dc137dd491857774819488e6ec95af0ad4c448b91324218594be902ff4c39255ef55c2654bf9260a857def2be16cf076acb3c41cac2edd5a94bf120728391995061d040d7aed46a08bec46cef34de7383dbdbbaf270692e048c775bc3987b42b19c29f2c9a6aadc4379b5b5fd447062e62e1eb92d3a3e94a10bfda111a91ac3ab388ac53a172a6a09e5bf1a35dc32af757e3ee4ee15957e717d6c2c824f0331c627c169470fc8c96b442f4ad89cd1ab221190e26876efef0d2a156750be552cb583b25ee4bffd6ad3124cd2e57c8a136b408ef526f52372a31e357131f1e16e06fe2739e55b0207a227b7682d581198f7f5e795b1a232fc11638867b7398a1e6271ed0b5afb7b18f0c64157fbec752148905b3df71e50f2ace2632e33cc05d71db8d7070e9f888f2a13e81158e4701aea19d1f4d5d7b7e8577f9f5ceab6a10e04019778a48c78ac1fa66ae1b286a868e5181747b59ee756ca5baed95f2a9b590211a2bdddd84553a8df28d7e270cb7f96ef51b88bbfe48d1a45e1c0bfa3b1f78589ab8c515ce7729ef4949686fa92e17d9bece9ef8008eb534b650614b8cbf8966291159bcd6a5e0667eac737de3956ca4751c52cf0d7f08f5a43acdd73207d6205251c6c7f26cf62d8761db5a1c437c1f5f0b7c31c81b713456c4f3e4abf9385a360466d002d5d8dd684854354924bb34ec08132b3f178642f6fbb935f4aca3ee65e99343879bf7f5f9586ec9e781c4ac62e438843f715c9aa2b0613b543f308c7598860132cdd0a7316a3543516c1dfb4acdfb56171abacabae4110be7d3b7dab9393ea756c81fd6d501ba7e61dd28b86d3e43a7c437a6e69b3a822bc5046291cf560600c162f6f12e91da2ba1a48a5479d33f020f09f9e92e128231b952974f315a5771d1f8ce5f9379fd78eaa1cc2c1cb754e3f3191bd901406191794e2434ddbc397c3eb10a918b8543af32b4ed4721c848505fc6eeb7dc2ad5fb221ebf2f43a1a6bd6cc1a6a440f40f04dd506ab81bf5357ab14c7db607987c7cf656f704bbb2acfee878b9cd35fa22c71f93511c3884f5b027e9edbf90306d44785597375b80791fa7c5cbd93794858650b6ddccfc8c610232886ea95c7e64441ca2e9ffc25130386adca28167d11829dc9af3496bc807d8385cffc3fe5489536a41cbf07ee913bb86913d36413db9922577431654145361d727ee586d407553105804479912de0b5943441afc0ae9497dd99d7855aed7fb1ffc211d3401deaa89138007d4eacd378b01bb287a43a0d9436804345e7eb7d2f06770c84552256789daf1d5a3a7002c7eb50372771c78dc27f79fb5a9591627e19b56c58f1187fd54c2e607630fa5ccb58a44e1455a51d2b31b8da44acc6da4f63e7604b05cee3a2455b90570d11af3f1db2bc6ff6008259b1e20b5d34aaabd7d9dad701d9745af7699098a3d8241dc6618506c6c13ae50e9d50a0c43ae4f769eb0bb6014057bc78e26d7302eb354536f38a5f60b27c8809798b248fb3e82f853dc1109466bc5c42304e5394dc2a80aae112a680c5299c2781576b808920442c31cd424320a73be4ed965b8fff757dafddf1dd7b0cc1a6cd4d4f4673bd1a71d7cb5ede6cb6d364d88be560300dba00ab8f0a3628779553006971edac5d040d44245dc661c9b5f88acfb32cd6d8d260eab103e45da0fd08744a2935f13e75ec454159b9ebd09383dd08a996f1bbf59e79ae89c7567594d29a1ef275fdaa201a4d6bf7372f3d79c0b355a5abf0e924e4f9dc48e198ebdc5d8ebe081d5ccd5b50e0d0db43d0761017173cf430e621cb6e96e783f28f56146785453d03b5275e2919354d02c97320ec06f99044dbdfa5bbc4835550c64130a5927f8eee325543e159feceead9e8794ced79ead7dfba82d6b610da957036922d56784111dbe3382cff48bd0ca9879a702181f5cc24871a1bc089ef61bc8c780c4651c96524550f99a536c786a461510271fbed4c6b86c0a01fa1f3745c7e38712e88bf7c1db08b3e867a8b491c700dcbf71d2878db3e98bd7657f7c1da3c63d750ff01196d1b0eefd3689689b964f52f0df48fa2c71f1e2a817982097a9a652b6176df2ef1de3aa69d3cc05d08735f3c63d21e6fc3aa7d98ca691e7edc694a0df73398eb92db6753ea71e9cd36ba4154fa3edc6257cccf233c300802b59803d29791374fc578844a884c54dbe4a7d5eab4b3a5b333af842982be8362586e914c1ebfd4d4f1a1b9f51eace4a1559425d3eaed10e6fc430482fe0cba3ee1d96ad3fdd084480c8a665ab091e8dc6fe4908996e710e5e9ff00fe8e844e83cde46ca80e7221b906097f8306cc40f0a11348f0efb4c4cc515a9b468c3095283921e95b7cfc207d0054b645dee1b288da18da7ba17cdb54594730351f99210c0f450c344c4e89a801fc83c5ee449a3be1817847c4e75a9018e299bdccc44511967a0bc37d5d3b025fe190f6f6df58efbf4eff3eb646d60f3cabdfe535a773e9d49dc660a5d5bfcbcdc8b8c1bd272f7f489162d4ddaa5f6fc3653c5104ee56466d33c3b69f2474cea1ccb9156496eaf3d3491be1da4127280aba16fdf91113aa5078796f08a629a35e53cad29479f5b29fd12f44a2c46ac4be1585b3d2678d7c8c32f2b492f20b6cb35794e453d9508bb5f1f1820ff2006b69d8f8fd4233847732834c16ced3eac60c47291a33db8718f6eed072a29eb6fd99acc444075c1c0632d2b8db707da3f721953bf4455b1b6f10b36dd6d467d4ff38832a6d56b87622be6c4531f3e38db6389173307edca6cb93a9b52eb6411aad301c17444fdea556c75a8ebe998e4d7ee5287c3ff4944bea72e87d7cbf6aa9a7882081b098e953b46ef8bf2dc675c2f3bfc7e96660c1f18f5ae168bd7dce4d9b0a65852f18b5e90abcab68b3d3dec4cd8bd1540fb99b770fab6263d1ab2fc63bedc0f73a8fe79f658e39747d57ba7018074460b43aba6f1c1eafb5dd422716ec4ddbec953bb3f8d11ce9df26783aaffda025696f24bc34c337ce87edf26e556238837ad1155bdc0524b9c489134741c5e3ee228049960e681f076e00ca74871d759171abd8b63ddf86883bef327773a79e53a2e3f0ecfd729b57a5a3c980649f3a25173901009afc497b866ba659afe0899edddbfe3e94e5074ff5db1803c877b6398f01b4cd6074afff52c4a0d7fb21b7b09f1e108fce476a104b7d735e5a9ed9816f08708abc850b5b43fa79dfe8aafb3f655f914a712ecd497361aaa1ca1c3af0fd09ff81ce00d46716b50c07774f978d2b7373b3f0cb8c34f22d9a2e6eddb0248f21d4ffac0e8ab626e02ee631261c7eb6ed1ae7d75fb38e772ac32dcaacc4e72a965bada344b9e50f5bb301f3e3b5059caabd6b3240627ebebdd1d8a97262dc766d5d7a02a2f7fa842611663df72ff198df67004fb04e409a9fca3b704b7ff9ec1c925d415ee0997777a7f317e67140640625cd69dcb1b5cdddb39c3b32bd2406754a7d698aa48d0c3796d4ec18f7cf0a6b13518c4fee3afd965da7c419b8819b200e82b6c6685366c4af02c9d5bfe053c3dd3be556638072f56357d595ce7bf4a77b2d96001923ebbbfb16557b331476b5648bf9cd38793218614dde202d26acbc18076c309a127a6745385802adae207be5a54d61aa8a96ccf727b5a86bafd17a511909b7251af38bbbe7ad54062c6484b520e91ef60733e54bd88dba469e2e4fd76e9c465772bb3ea086218a73ae4d8a574d3cfe2522a38d29019dfd493a34b55fa675eeebcb31929b95a53544b7ec3009d58aae055acb2f56d7a22ab7272c27c70765dee9c2bdf1593b547790e0ad26d60179600e9677b99ebde064c15ed69fb91d9f85c590db4618629adb5726932a317f41a0592b7bfea6eb37259b72a020c7ef57b008b3c410dd9e6ca807db02e5b61cead5ced754303937203f67308b2b791a1b6bdf9e6fa46cd6ff73e8715ee59379a03258bfc6b43b5fb590a14b4e77b5fe884248bfe4d971102e68bf0a01abfaaced748090ee926b0eaf0f3b3db0d5494519fc61fd4e36a4f3496c580bcde20a206073c8709766ea168686d57634d40e72a6f57a3a01acc5338289f9acfec099499c698fcbd466e06aa25c7a71b74d0c254e11653cd8af95a150348b75aea8684f720223def9ccc00a73555ad4d8c130b5e314652b3bfa1687febea96e15470f9f66186c60ed811f23e7185fba7609d47a4533451ef12abb91a1956a5e08930bec5e0203844dad1ec2d4fcb8ce94f1a53421399bdd528c65e3e2671734510720169fa5f1a2528f4c4deaeca1f3f79442f87bcb6e464efb24501d9280cb37b1f9e3f7cc21ac7c2341a808bc97eee6a963fc0344c064f75c892878ac5facb661c9424e767d46554180352ae7ea5b2a0f2db07356c7e6559d9535e46eef8e008e112e9c7d7dd4f3b18e798818e84db34910a1217a96b32b927d3f92ba9b4c2b9960073fde6ead5263faa454afb0a66816c70679377c09321a9e386c500b9bec9df35987f99bfc09cfd74a49bce45cf000c17207971c166ab5b46e5f7981be588de119d4da1c981186d2a442455dd7bdecb5abe5be8b289f8d0741ae5bc6ad45ce5710796b56e9ac1a2b588febd09e13673a81da4ace3516e943c4f719b3a5ff9dc72fe22694670da864070e9a8e445b190e85f58968ae94accaa0c57acc4f1ace96bc588a62e5ffedb805b5dff0566bf0cf9968bd5dfdf29485db8460e22b191829a49d5c6f3b639d48c04e131fffcc7e5120f3562a425732e0ecdd31c3ed40e12c1886412d1b178ed5b5744b9f7bba7aa92c9a7b1bed795f888ded7089463347c2b0d479395d6867f233cf3306e9c3e197e84a889d5286c374290c13bab15163c3b47af9c76a9c9d284d47a78dbb7036e30d56e9f6ea33aec220b6a2c8b13ffb2022e6cf08b47c54cb3bf435f0b6936600880f4f141e45d6ba552d3bf15c985635521574895f8e7ff7aa9d28cc7efa51f4a521dea82e9841bc7c8d1a607e477cb7ac83fd28c701d6f4b61a51ed8c662f52ab434752cf61243062c6b709a48b6bb8759e61e9552fb3cfb2b824354359ee49dcef9ea8530fbb7f5a9a1f3df8ea77dc2d9b6b41abaa11565ad83c2f761dbf4c4add383ac2c8c9812a2765487007ec94f1c6e4f97cd1a380cad87f25ba8183daa8e4f4877b163bdff347f517d62cb35da0f9bc289710bb08914a855f70f09643c5f494dd30baf1906ae02ee0bd4b8d24e5", 0x1000, 0xa81e}, {&(0x7f0000001480)="e5c17f14360a41e01c0831d20cbc37368e498165808ad4bee99cc1284b389eef7bfa509c419c7d833446fa935df68f811b4ff36e3f667dfc6681407a0e04dde25a72605daf89917ebc792cb864faa8c4b91beeab7b9ebddab1fd708c05387177507f08efbe44a014937cb6445330", 0x6e, 0x800}], 0x20, &(0x7f0000001800)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x32]}}, {@mpol={'mpol', 0x3d, {'local', '', @val={0x3a, [0x39, 0x2c, 0x3a, 0x33, 0x30, 0x32, 0x2c, 0x36, 0x2f]}}}}], [{@euid_gt={'euid>', r0}}, {@dont_appraise}, {@fsname={'fsname', 0x3d, '@'}}, {@uid_gt={'uid>', r1}}, {@subj_type={'subj_type', 0x3d, 'v7\x00'}}, {@appraise}, {@audit}, {@fowner_eq={'fowner', 0x3d, r2}}, {@permit_directio}]}) 06:04:24 executing program 0: clock_nanosleep(0x1, 0x0, &(0x7f0000000000)={0x0, 0x989680}, 0x0) 06:04:24 executing program 4: setpriority(0x0, 0x0, 0x7fffffff) 06:04:24 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0xb06}, 0x40) [ 532.901872][ T2038] block nbd1: Attempted send on invalid socket [ 532.908594][ T2038] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 532.980248][T18871] VFS: could not find a valid V7 on nbd1. [ 533.033238][T18876] loop1: detected capacity change from 0 to 168 06:04:25 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {0x0}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) [ 533.197981][ T1988] block nbd1: Attempted send on invalid socket [ 533.204505][ T1988] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 533.225329][T18871] VFS: could not find a valid V7 on nbd1. 06:04:25 executing program 0: syz_genetlink_get_family_id$smc(&(0x7f0000000080), 0xffffffffffffffff) [ 533.847197][T18897] IPVS: ftp: loaded support on port[0] = 21 06:04:27 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000180)=""/6, 0x6}], 0x3, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:04:27 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10800}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x14}, 0x14}}, 0x0) 06:04:27 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000200)=ANY=[@ANYBLOB="2f6465762f6e6264300002b1de7eff2eac3b9cad173c89ad80c8ff2158aface4afc7ee989878385df7abdde7b2f00901aefffca6c13749244f15bcc1e523c2bd0071bbd6daeb9c392d6391fd7945fddbdcb8c704d0832af5698721bf8f33bd3614d7a950fc1a59a27aff0b886435effffb01657ba70d60c09042a70123b64b9f2ad58e4d5491e748f139882053a3ac1ad058769a7e2639cdcc065620a1f0c220962a0f89f6ae9980271dc7932c12bd891808dae1016c9a8f9847ce5a350f428c11eb6484c241f84dfc6a7be9292dd2f52fd1da9aea43e72adbb41030"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) 06:04:27 executing program 0: socketpair(0x6, 0x0, 0x0, &(0x7f0000000200)) 06:04:27 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {0x0}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) [ 535.243830][ T1988] block nbd0: Attempted send on invalid socket [ 535.248797][T18931] IPVS: ftp: loaded support on port[0] = 21 [ 535.250114][ T1988] blk_update_request: I/O error, dev nbd0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 535.301827][T18930] VFS: could not find a valid V7 on nbd0. 06:04:27 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x1c10c0, 0x0) 06:04:27 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000140)=@sack_info={0x0, 0x0, 0x8}, 0xc) [ 535.709538][T18957] IPVS: ftp: loaded support on port[0] = 21 06:04:27 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_PMKSA(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14, r1, 0x1, 0x0, 0x0, {{0x32}, {@void, @void}}}, 0x14}}, 0x0) sendmsg$NL80211_CMD_FLUSH_PMKSA(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, r1, 0x300, 0x70bd25, 0x25dfdbff, {{}, {@void, @void}}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x0) syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r2) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x8000, 0x0) r4 = openat$bsg(0xffffff9c, &(0x7f0000000040), 0x402200, 0x0) r5 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_int(r5, 0x29, 0x21, &(0x7f0000000180)=0x101, 0x4) r6 = dup(r5) connect$inet6(r6, &(0x7f0000000040)={0xa, 0x4e25, 0x0, @empty}, 0x1c) getpeername$inet6(r6, 0x0, &(0x7f0000000140)) sendmsg$nl_route_sched(r6, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)=@newchain={0x5c, 0x64, 0x8, 0x70bd29, 0x25dfdbff, {0x0, 0x0, 0x0, r3, {0x3, 0xa}, {0x3, 0x3}, {0x2, 0x3}}, [@TCA_CHAIN={0x8, 0xb, 0x2}, @TCA_CHAIN={0x8}, @TCA_CHAIN={0x8, 0xb, 0x124569d3}, @TCA_CHAIN={0x8, 0xb, 0x2}, @TCA_RATE={0x6, 0x5, {0x4, 0x21}}, @TCA_CHAIN={0x8, 0xb, 0x80000000}, @TCA_CHAIN={0x8, 0xb, 0x3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x801}, 0x28000045) write$P9_RREADLINK(r4, &(0x7f00000000c0)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) mount(&(0x7f0000000100)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='bdev\x00', 0x10000, 0x0) 06:04:28 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0x80086601, &(0x7f0000000100)) 06:04:28 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f00000029c0)=""/120, 0x78}], 0x3, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:04:28 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x85, 0x0, &(0x7f0000000500)) 06:04:28 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x212080, 0x0) [ 536.684449][T18991] IPVS: ftp: loaded support on port[0] = 21 [ 536.707583][ T1988] block nbd1: Attempted send on invalid socket [ 536.714341][ T1988] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 536.790322][T18990] VFS: could not find a valid V7 on nbd1. [ 536.881573][ T1988] block nbd1: Attempted send on invalid socket [ 536.888208][ T1988] blk_update_request: I/O error, dev nbd1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 536.935842][T18997] VFS: could not find a valid V7 on nbd1. 06:04:29 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000880)) 06:04:29 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000300)={'sit0\x00', 0x0}) 06:04:29 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000180)=""/6, 0x6}], 0x3, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:04:29 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) read$qrtrtun(r0, 0x0, 0x0) 06:04:29 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f00000000c0), 0x8) 06:04:29 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f00000029c0)=""/120, 0x78}], 0x3, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:04:29 executing program 4: syz_open_dev$usbfs(&(0x7f0000000000), 0x0, 0x0) 06:04:29 executing program 0: setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, &(0x7f00000001c0)) socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) [ 537.808351][T19031] IPVS: ftp: loaded support on port[0] = 21 06:04:30 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)) [ 538.226481][T19038] IPVS: ftp: loaded support on port[0] = 21 06:04:30 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, 0x0) 06:04:30 executing program 4: bind$isdn_base(0xffffffffffffffff, 0x0, 0x0) 06:04:31 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, &(0x7f0000000100)) 06:04:31 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f00000029c0)=""/120, 0x78}], 0x3, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:04:31 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000001200)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000011c0)={0x0}}, 0x0) 06:04:31 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000180)=""/6, 0x6}], 0x3, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:04:31 executing program 1: syz_genetlink_get_family_id$team(&(0x7f0000000080), 0xffffffffffffffff) 06:04:31 executing program 4: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80800) read$qrtrtun(r0, 0x0, 0x2e) [ 539.398583][T19100] IPVS: ftp: loaded support on port[0] = 21 06:04:31 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, &(0x7f0000000100)) [ 539.714510][T19112] IPVS: ftp: loaded support on port[0] = 21 06:04:31 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000180)=ANY=[@ANYRES32], &(0x7f0000000280)=0xe6) 06:04:32 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {0x0}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:04:32 executing program 4: r0 = getpgid(0x0) ptrace(0xffffffffffffffff, r0) 06:04:32 executing program 1: setrlimit(0x7, &(0x7f0000000040)={0x0, 0x200}) 06:04:32 executing program 0: setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000000)=@req={0x8, 0x7f, 0x7fff, 0x241aa5b0}, 0x10) r0 = accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) connect$packet(r0, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x1, 0x1, 0x6, @random="16bcfe48ba2f"}, 0x14) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x4}, 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x10000, 0x30}, &(0x7f0000000140)=0xc) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000180)={r1, 0x4}, &(0x7f00000001c0)=0xc) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000200)={r2, @in6={{0xa, 0x4e22, 0x7f, @mcast2, 0x5}}}, &(0x7f00000002c0)=0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000340)={r4, 0x0, &(0x7f0000000300)}, &(0x7f0000000380)=0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000003c0)={r4, @in={{0x2, 0x4e22, @local}}, 0x5, 0x5, 0x10001, 0x0, 0x3, 0x2, 0x4}, 0x9c) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000480)={'ip6tnl0\x00', 0x0, 0x29, 0x4, 0x0, 0x2, 0x4, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x80, 0x7, 0x9000}}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000540)={r4, 0x7}, &(0x7f0000000580)=0x8) getsockopt$packet_int(r0, 0x107, 0xa, &(0x7f00000005c0), &(0x7f0000000600)=0x4) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000640)={r2, @in6={{0xa, 0x4e23, 0x3ff, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)={0x0, 0xdc, "c5be441a1be10bf757bd882d070fbf0f0640c938cdcd06e0ddb50f92fd173c7af300abc0b3c30310805d8931f612dc56bc581d6f49ffa5012a7466494caca1fe392549de397ec67c216a49b555fb8ac0c828e9e9bc9dd64fba71365e1c465d0707215a2daaa003dbdbc60af670e6e4cd4fd16e0e63e572a543284ac185b4910524d33f1c5b5689e25854635ade1d09d1febbda7d4375bbdcdcf1b24e33befd5d69ce52cd1112d537536416661168c1dedd8509dcc467d79af5fea474f1c65b7bdd2d30b8259613ec978fc4931d1c5be9f827ae5a258e0694b6633261"}, &(0x7f0000000800)=0xe4) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000840)={0x0, @broadcast, @empty}, &(0x7f0000000880)=0xc) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f00000009c0)={'sit0\x00', &(0x7f0000000940)={'syztnl1\x00', r5, 0x2f, 0x8, 0x7f, 0x9, 0x0, @remote, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7810, 0x8, 0x3b, 0x5}}) 06:04:32 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {0x0}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:04:32 executing program 5: msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000000)={{0x2, 0xee00, 0xee00}}) [ 540.859037][T19162] IPVS: ftp: loaded support on port[0] = 21 06:04:32 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000140)=@sack_info={0x0, 0x7ff}, 0xc) [ 541.252565][T19193] IPVS: ftp: loaded support on port[0] = 21 06:04:33 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, @in={0x2, 0x0, @multicast2}, @vsock={0x28, 0x0, 0x0, @host}, @nl=@proc}) 06:04:33 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, 0x0, &(0x7f00000004c0)) 06:04:33 executing program 1: add_key(&(0x7f0000000000)='asymmetric\x00', 0x0, &(0x7f0000000080)="fd", 0x1, 0xfffffffffffffffe) 06:04:33 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {0x0}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:04:34 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x1}, 0x14}}, 0x0) 06:04:34 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000900)={0x0, 0x0, 0x0}, 0x0) 06:04:34 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {0x0}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) [ 542.286437][T19227] IPVS: ftp: loaded support on port[0] = 21 06:04:34 executing program 5: socketpair(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$mptcp(&(0x7f0000000200), r0) 06:04:34 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000a40), 0x0, 0x0) connect$caif(r0, &(0x7f0000000500)=@dbg, 0x18) 06:04:34 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {0x0}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:04:34 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000018c0), 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001ac0)={&(0x7f00000004c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 06:04:35 executing program 4: add_key$user(&(0x7f0000000480), 0x0, 0x0, 0x0, 0xfffffffffffffffc) 06:04:35 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0x401c5820, &(0x7f0000000100)) [ 543.254798][T19258] IPVS: ftp: loaded support on port[0] = 21 06:04:35 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000100)={0x0, @in={{0x2, 0x0, @broadcast}}}, &(0x7f00000001c0)=0x84) [ 543.449529][T19265] IPVS: ftp: loaded support on port[0] = 21 06:04:36 executing program 0: rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000100)={0x0, 0x0, 0x6}) 06:04:36 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, 0x0, 0x0) 06:04:36 executing program 5: r0 = io_uring_setup(0x65d1, &(0x7f0000000340)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000005c0)=[{0x0}], 0x1) 06:04:36 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {0x0}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:04:36 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x3, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:04:36 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty}, 0x1c, &(0x7f0000000100)=[{0x0}, {0x0}], 0x2, &(0x7f00000001c0)=[@authinfo={0x18}, @sndrcv={0x30}], 0x48}, 0x0) 06:04:36 executing program 4: msgget(0x3, 0x608) 06:04:36 executing program 0: syz_open_dev$admmidi(&(0x7f0000000000), 0x1000, 0x0) 06:04:37 executing program 5: rt_sigaction(0x12, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000180)) 06:04:37 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000840)={0x0, @broadcast, @empty}, &(0x7f0000000880)=0xc) [ 545.316268][T19331] IPVS: ftp: loaded support on port[0] = 21 [ 545.330373][T19330] IPVS: ftp: loaded support on port[0] = 21 06:04:37 executing program 4: syz_open_dev$midi(&(0x7f0000000940), 0x0, 0x204400) 06:04:37 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000640), &(0x7f0000000680)=0x14) 06:04:37 executing program 5: socketpair(0x2c, 0x3, 0x0, &(0x7f0000000200)) 06:04:38 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x3, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:04:38 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000980), 0xffffffffffffffff) 06:04:38 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x3, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:04:38 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x84, 0x0, &(0x7f0000000500)) [ 546.655968][T19393] IPVS: ftp: loaded support on port[0] = 21 06:04:38 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x0, 0x0, &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:04:38 executing program 0: openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000080)) 06:04:39 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540), &(0x7f0000000580)=0x8) [ 547.338042][T19420] IPVS: ftp: loaded support on port[0] = 21 06:04:39 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x3, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:04:39 executing program 4: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x410000, 0x0) 06:04:39 executing program 5: setsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, 0x0, 0x0) 06:04:40 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_HANDLE_TO_FD(r0, 0xc01064c1, &(0x7f0000000000)) [ 548.102953][T19446] IPVS: ftp: loaded support on port[0] = 21 06:04:40 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000001180)={0x0, 0x10, &(0x7f0000001080)=[@in={0x2, 0x0, @rand_addr=0x64010101}]}, &(0x7f00000011c0)=0x10) 06:04:40 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {0x0}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:04:40 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x24000080) [ 549.142914][T19498] IPVS: ftp: loaded support on port[0] = 21 06:04:42 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000001200)={0x0, 0x0, &(0x7f00000011c0)={&(0x7f0000000d00)={0x14}, 0x14}}, 0x0) 06:04:42 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x3, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:04:42 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0x2, &(0x7f0000000100)) 06:04:42 executing program 4: socketpair(0xa, 0x3, 0x0, &(0x7f0000000200)) 06:04:42 executing program 1: ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) getpgid(0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = io_uring_setup(0x65d1, &(0x7f0000000340)={0x0, 0x0, 0x1}) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000005c0)=[{&(0x7f00000003c0)=""/186, 0xba}, {&(0x7f0000001ac0)=""/4096, 0x1000}], 0x2) 06:04:42 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {0x0}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) [ 551.129556][T19540] IPVS: ftp: loaded support on port[0] = 21 06:04:43 executing program 0: socket$inet(0x2, 0x6, 0x8) [ 551.529566][T19565] IPVS: ftp: loaded support on port[0] = 21 06:04:43 executing program 5: sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, 0x0, 0x0) 06:04:43 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000001800), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 06:04:43 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {0x0}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:04:43 executing program 4: msgget(0x1, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000080)=""/246) fork() 06:04:44 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x3, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:04:44 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0x80086301, &(0x7f0000000100)) [ 552.520442][T19604] IPVS: ftp: loaded support on port[0] = 21 [ 552.893249][T19622] IPVS: ftp: loaded support on port[0] = 21 06:04:45 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 06:04:45 executing program 0: setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) 06:04:45 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x3, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:04:45 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0x80086301, 0x0) 06:04:45 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000a40), 0x0, 0x0) read$usbfs(r0, 0x0, 0x0) 06:04:45 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0x0, 0x0, 0x0, 0x0, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}]}, 0x2c}}, 0x0) 06:04:45 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {0x0}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) [ 553.959105][T19671] IPVS: ftp: loaded support on port[0] = 21 06:04:46 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000000)={0x0, 0x109, 0x40, 0x6}, 0x10) 06:04:46 executing program 4: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000040)='./file0/file0\x00', 0x80000010) 06:04:46 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000a40), 0x0, 0x0) [ 554.582916][T19700] IPVS: ftp: loaded support on port[0] = 21 06:04:46 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0x5, 0x0) 06:04:46 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x3, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:04:47 executing program 4: clock_getres(0x1ca6c5eebab7ab83, 0x0) 06:04:47 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, 0x0, 0x0) [ 555.455600][T19732] IPVS: ftp: loaded support on port[0] = 21 06:04:47 executing program 1: socketpair(0x10, 0x0, 0x0, &(0x7f0000000200)) 06:04:47 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) 06:04:47 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {0x0}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:04:48 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x3, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:04:48 executing program 4: syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x4000) 06:04:48 executing program 0: socketpair(0xa, 0x3, 0x2, &(0x7f0000000200)) 06:04:48 executing program 5: r0 = socket(0x1e, 0x1, 0x0) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x79, 0x0, 0x0) [ 556.449293][T19766] IPVS: ftp: loaded support on port[0] = 21 [ 556.591888][T19771] IPVS: ftp: loaded support on port[0] = 21 06:04:48 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x30}, 0xc) 06:04:49 executing program 0: clock_nanosleep(0x2, 0x0, &(0x7f0000000200)={0x77359400}, 0x0) clock_nanosleep(0x2, 0x0, &(0x7f0000000100), 0x0) 06:04:49 executing program 4: epoll_pwait(0xffffffffffffffff, 0x0, 0x0, 0x7ff, &(0x7f0000000200), 0x8) 06:04:49 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{0x0}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:04:49 executing program 1: msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000080)={{0x1, 0x0, 0xffffffffffffffff, 0x0, 0xee00}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) 06:04:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 06:04:49 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {0x0}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) [ 557.979491][T19830] IPVS: ftp: loaded support on port[0] = 21 06:04:50 executing program 4: r0 = getpgid(0x0) setpriority(0x0, r0, 0x7fffffff) [ 558.418626][T19856] IPVS: ftp: loaded support on port[0] = 21 06:04:50 executing program 1: r0 = epoll_create(0x7fffffff) epoll_wait(r0, &(0x7f0000000140)=[{}], 0x1, 0x6) 06:04:50 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000), 0x10) 06:04:51 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @private}}}}, &(0x7f0000000200)=0xb0) 06:04:51 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{0x0}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r0, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r1 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r0, 0x0) kcmp(r2, r0, 0x2, r1, r1) 06:04:51 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064ce, &(0x7f0000000100)) 06:04:51 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000540)=""/218, 0xda}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000180)=""/6, 0x6}], 0x3, 0x2, 0xfffff000) recvmmsg(0xffffffffffffffff, &(0x7f0000002b00)=[{{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/79, 0x4f}], 0x2, &(0x7f0000000940)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001940)=""/27, 0x1b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/8, 0x8}, {&(0x7f00000029c0)=""/120, 0x78}], 0x4, &(0x7f0000002a80)=""/72, 0x48}, 0xe34}], 0x2, 0x0, &(0x7f0000002b40)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x40, 0x2, 0x9, 0x0, 0x700000000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x1000, 0x5, 0x6, 0x7, 0x269, 0x5, 0x1ff, 0x0, 0x7fffffff, 0x0, 0x80000000}, r1, 0x8, 0xffffffffffffffff, 0x8) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xf616ec17addfb5f8) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000100)) set_mempolicy(0x8000, &(0x7f00000002c0)=0x1, 0x2340) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000280)={&(0x7f0000000740)=""/166, 0xa6}) pidfd_open(r1, 0x0) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) kcmp(r3, r1, 0x2, r2, r2) 06:04:51 executing program 1: r0 = msgget(0x3, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) 06:04:51 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000a40), 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) [ 559.809126][T19891] IPVS: ftp: loaded support on port[0] = 21 06:04:52 executing program 0: r0 = syz_open_dev$I2C(&(0x7f0000000000), 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/233, 0xe9}], 0x1, 0x0, 0x0) [ 560.205691][T19897] IPVS: ftp: loaded support on port[0] = 21 06:04:52 executing program 4: r0 = msgget(0x3, 0x0) msgctl$MSG_STAT_ANY(r0, 0xd, &(0x7f0000000100)=""/215) [ 560.920680][T19946] ===================================================== [ 560.927754][T19946] BUG: KMSAN: kernel-infoleak in kmsan_copy_to_user+0x9c/0xb0 [ 560.935252][T19946] CPU: 0 PID: 19946 Comm: syz-executor.0 Not tainted 5.12.0-rc6-syzkaller #0 [ 560.944044][T19946] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 560.954219][T19946] Call Trace: [ 560.957525][T19946] dump_stack+0x24c/0x2e0 [ 560.961889][T19946] kmsan_report+0xfb/0x1e0 [ 560.966424][T19946] kmsan_internal_check_memory+0x469/0x500 [ 560.972423][T19946] ? i2c_transfer+0x370/0x620 [ 560.977174][T19946] kmsan_copy_to_user+0x9c/0xb0 [ 560.982155][T19946] _copy_to_user+0x1ac/0x270 [ 560.987139][T19946] i2cdev_read+0x23d/0x350 [ 560.991916][T19946] do_iter_read+0x6a7/0x1100 [ 560.996658][T19946] ? put_i2c_dev+0x2c0/0x2c0 [ 561.001336][T19946] do_preadv+0x454/0x6a0 [ 561.006014][T19946] ? __msan_instrument_asm_store+0x104/0x130 [ 561.012203][T19946] ? kmsan_get_metadata+0x116/0x180 [ 561.017763][T19946] __se_compat_sys_preadv+0xef/0x100 [ 561.023056][T19946] __ia32_compat_sys_preadv+0x62/0x80 [ 561.028517][T19946] __do_fast_syscall_32+0x127/0x180 [ 561.034038][T19946] do_fast_syscall_32+0x77/0xd0 [ 561.039080][T19946] do_SYSENTER_32+0x73/0x90 [ 561.043610][T19946] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 561.050112][T19946] RIP: 0023:0xf7fb2549 [ 561.054184][T19946] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 561.074054][T19946] RSP: 002b:00000000f55ac5fc EFLAGS: 00000296 ORIG_RAX: 000000000000014d [ 561.082480][T19946] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 561.090444][T19946] RDX: 0000000000000001 RSI: 0000000000000000 RDI: 0000000000000000 [ 561.098581][T19946] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 561.106572][T19946] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 561.114546][T19946] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 561.122619][T19946] [ 561.124938][T19946] Uninit was created at: [ 561.129162][T19946] kmsan_internal_poison_shadow+0x66/0xd0 [ 561.134905][T19946] kmsan_slab_alloc+0x8e/0xe0 [ 561.139597][T19946] __kmalloc+0x387/0x550 [ 561.143835][T19946] i2cdev_read+0x128/0x350 [ 561.148258][T19946] do_iter_read+0x6a7/0x1100 [ 561.152936][T19946] do_preadv+0x454/0x6a0 [ 561.157531][T19946] __se_compat_sys_preadv+0xef/0x100 [ 561.162838][T19946] __ia32_compat_sys_preadv+0x62/0x80 [ 561.168212][T19946] __do_fast_syscall_32+0x127/0x180 [ 561.173692][T19946] do_fast_syscall_32+0x77/0xd0 [ 561.178642][T19946] do_SYSENTER_32+0x73/0x90 [ 561.183320][T19946] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 561.189907][T19946] [ 561.192246][T19946] Bytes 0-232 of 233 are uninitialized [ 561.197727][T19946] Memory access of size 233 starts at ffff88817bd04800 [ 561.204673][T19946] Data copied to user address 00000000200000c0 [ 561.211053][T19946] ===================================================== [ 561.219976][T19946] Disabling lock debugging due to kernel taint [ 561.226215][T19946] Kernel panic - not syncing: panic_on_kmsan set ... [ 561.232891][T19946] CPU: 0 PID: 19946 Comm: syz-executor.0 Tainted: G B 5.12.0-rc6-syzkaller #0 [ 561.243045][T19946] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 561.253095][T19946] Call Trace: [ 561.256369][T19946] dump_stack+0x24c/0x2e0 [ 561.260702][T19946] panic+0x4c6/0xea7 [ 561.264674][T19946] ? add_taint+0x17c/0x210 [ 561.269089][T19946] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 561.275269][T19946] kmsan_report+0x1de/0x1e0 [ 561.279775][T19946] kmsan_internal_check_memory+0x469/0x500 [ 561.285586][T19946] ? i2c_transfer+0x370/0x620 [ 561.290267][T19946] kmsan_copy_to_user+0x9c/0xb0 [ 561.295165][T19946] _copy_to_user+0x1ac/0x270 [ 561.299760][T19946] i2cdev_read+0x23d/0x350 [ 561.304191][T19946] do_iter_read+0x6a7/0x1100 [ 561.308786][T19946] ? put_i2c_dev+0x2c0/0x2c0 [ 561.313377][T19946] do_preadv+0x454/0x6a0 [ 561.317718][T19946] ? __msan_instrument_asm_store+0x104/0x130 [ 561.323785][T19946] ? kmsan_get_metadata+0x116/0x180 [ 561.328983][T19946] __se_compat_sys_preadv+0xef/0x100 [ 561.334271][T19946] __ia32_compat_sys_preadv+0x62/0x80 [ 561.339760][T19946] __do_fast_syscall_32+0x127/0x180 [ 561.344960][T19946] do_fast_syscall_32+0x77/0xd0 [ 561.349815][T19946] do_SYSENTER_32+0x73/0x90 [ 561.354404][T19946] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 561.360822][T19946] RIP: 0023:0xf7fb2549 [ 561.364880][T19946] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 561.384496][T19946] RSP: 002b:00000000f55ac5fc EFLAGS: 00000296 ORIG_RAX: 000000000000014d [ 561.392996][T19946] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 561.400975][T19946] RDX: 0000000000000001 RSI: 0000000000000000 RDI: 0000000000000000 [ 561.409023][T19946] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 561.416996][T19946] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 561.424956][T19946] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 561.434409][T19946] Kernel Offset: disabled [ 561.438808][T19946] Rebooting in 86400 seconds..