[....] Starting OpenBSD Secure Shell server: sshd[ 29.350268] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 32.678345] random: sshd: uninitialized urandom read (32 bytes read) [ 32.988458] kauditd_printk_skb: 9 callbacks suppressed [ 32.988466] audit: type=1400 audit(1568801991.899:35): avc: denied { map } for pid=6827 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 33.042903] random: sshd: uninitialized urandom read (32 bytes read) [ 33.659773] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.180' (ECDSA) to the list of known hosts. [ 39.177021] random: sshd: uninitialized urandom read (32 bytes read) 2019/09/18 10:19:58 fuzzer started [ 39.363649] audit: type=1400 audit(1568801998.279:36): avc: denied { map } for pid=6837 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 40.171855] random: cc1: uninitialized urandom read (8 bytes read) 2019/09/18 10:20:00 dialing manager at 10.128.0.105:44707 2019/09/18 10:20:00 syscalls: 2466 2019/09/18 10:20:00 code coverage: enabled 2019/09/18 10:20:00 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2019/09/18 10:20:00 extra coverage: extra coverage is not supported by the kernel 2019/09/18 10:20:00 setuid sandbox: enabled 2019/09/18 10:20:00 namespace sandbox: enabled 2019/09/18 10:20:00 Android sandbox: /sys/fs/selinux/policy does not exist 2019/09/18 10:20:00 fault injection: enabled 2019/09/18 10:20:00 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/09/18 10:20:00 net packet injection: enabled 2019/09/18 10:20:00 net device setup: enabled [ 42.152398] random: crng init done 10:21:21 executing program 0: 10:21:21 executing program 5: 10:21:21 executing program 1: 10:21:21 executing program 2: 10:21:21 executing program 3: [ 122.543565] audit: type=1400 audit(1568802081.459:37): avc: denied { map } for pid=6837 comm="syz-fuzzer" path="/root/syzkaller-shm140020489" dev="sda1" ino=16490 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 10:21:21 executing program 4: [ 122.573721] audit: type=1400 audit(1568802081.489:38): avc: denied { map } for pid=6855 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=19 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 122.751770] IPVS: ftp: loaded support on port[0] = 21 [ 123.541393] IPVS: ftp: loaded support on port[0] = 21 [ 123.558446] chnl_net:caif_netlink_parms(): no params data found [ 123.604862] IPVS: ftp: loaded support on port[0] = 21 [ 123.618760] bridge0: port 1(bridge_slave_0) entered blocking state [ 123.625560] bridge0: port 1(bridge_slave_0) entered disabled state [ 123.632444] device bridge_slave_0 entered promiscuous mode [ 123.655354] bridge0: port 2(bridge_slave_1) entered blocking state [ 123.661782] bridge0: port 2(bridge_slave_1) entered disabled state [ 123.668668] device bridge_slave_1 entered promiscuous mode [ 123.699679] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 123.710148] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 123.728622] chnl_net:caif_netlink_parms(): no params data found [ 123.743506] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 123.750828] team0: Port device team_slave_0 added [ 123.763685] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 123.771237] team0: Port device team_slave_1 added [ 123.779463] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 123.788559] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 123.804564] IPVS: ftp: loaded support on port[0] = 21 [ 123.872436] device hsr_slave_0 entered promiscuous mode [ 123.950225] device hsr_slave_1 entered promiscuous mode [ 124.012362] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 124.029819] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 124.047951] bridge0: port 1(bridge_slave_0) entered blocking state [ 124.054360] bridge0: port 1(bridge_slave_0) entered disabled state [ 124.062088] device bridge_slave_0 entered promiscuous mode [ 124.069994] bridge0: port 2(bridge_slave_1) entered blocking state [ 124.076743] bridge0: port 2(bridge_slave_1) entered disabled state [ 124.083956] device bridge_slave_1 entered promiscuous mode [ 124.102446] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 124.125299] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 124.135323] chnl_net:caif_netlink_parms(): no params data found [ 124.168440] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 124.176314] team0: Port device team_slave_0 added [ 124.184018] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 124.191279] team0: Port device team_slave_1 added [ 124.196615] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 124.217136] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 124.224759] bridge0: port 2(bridge_slave_1) entered blocking state [ 124.231153] bridge0: port 2(bridge_slave_1) entered forwarding state [ 124.237871] bridge0: port 1(bridge_slave_0) entered blocking state [ 124.244229] bridge0: port 1(bridge_slave_0) entered forwarding state [ 124.258013] bridge0: port 1(bridge_slave_0) entered blocking state [ 124.258627] IPVS: ftp: loaded support on port[0] = 21 [ 124.264818] bridge0: port 1(bridge_slave_0) entered disabled state [ 124.276711] device bridge_slave_0 entered promiscuous mode [ 124.288299] bridge0: port 2(bridge_slave_1) entered blocking state [ 124.294701] bridge0: port 2(bridge_slave_1) entered disabled state [ 124.301936] device bridge_slave_1 entered promiscuous mode [ 124.332408] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 124.341395] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 124.392985] device hsr_slave_0 entered promiscuous mode [ 124.431561] device hsr_slave_1 entered promiscuous mode [ 124.502262] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 124.517827] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 124.524946] team0: Port device team_slave_0 added [ 124.530128] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 124.537028] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 124.544216] team0: Port device team_slave_1 added [ 124.563364] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 124.570860] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 124.578899] bridge0: port 1(bridge_slave_0) entered disabled state [ 124.586063] bridge0: port 2(bridge_slave_1) entered disabled state [ 124.617312] IPVS: ftp: loaded support on port[0] = 21 [ 124.623090] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 124.712072] device hsr_slave_0 entered promiscuous mode [ 124.750240] device hsr_slave_1 entered promiscuous mode [ 124.810731] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 124.817713] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 124.831250] chnl_net:caif_netlink_parms(): no params data found [ 124.887287] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 124.935105] bridge0: port 1(bridge_slave_0) entered blocking state [ 124.941649] bridge0: port 1(bridge_slave_0) entered disabled state [ 124.948397] device bridge_slave_0 entered promiscuous mode [ 124.956782] bridge0: port 2(bridge_slave_1) entered blocking state [ 124.963212] bridge0: port 2(bridge_slave_1) entered disabled state [ 124.971104] device bridge_slave_1 entered promiscuous mode [ 124.980791] chnl_net:caif_netlink_parms(): no params data found [ 125.006563] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 125.025466] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 125.059617] 8021q: adding VLAN 0 to HW filter on device bond0 [ 125.075315] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 125.082760] team0: Port device team_slave_0 added [ 125.088293] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 125.095565] team0: Port device team_slave_1 added [ 125.111996] 8021q: adding VLAN 0 to HW filter on device bond0 [ 125.118201] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 125.125298] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.132069] bridge0: port 1(bridge_slave_0) entered disabled state [ 125.138813] device bridge_slave_0 entered promiscuous mode [ 125.145711] bridge0: port 2(bridge_slave_1) entered blocking state [ 125.152108] bridge0: port 2(bridge_slave_1) entered disabled state [ 125.158954] device bridge_slave_1 entered promiscuous mode [ 125.179815] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 125.188779] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 125.197989] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 125.205159] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 125.216795] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 125.225658] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 125.233312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 125.242493] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 125.251536] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 125.257595] 8021q: adding VLAN 0 to HW filter on device team0 [ 125.266446] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 125.289240] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 125.300639] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 125.308510] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 125.316270] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.322645] bridge0: port 1(bridge_slave_0) entered forwarding state [ 125.329438] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 125.336895] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 125.344049] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 125.355240] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 125.362718] team0: Port device team_slave_0 added [ 125.378180] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 125.422066] device hsr_slave_0 entered promiscuous mode [ 125.460320] device hsr_slave_1 entered promiscuous mode [ 125.500621] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 125.507676] team0: Port device team_slave_1 added [ 125.514465] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 125.520610] 8021q: adding VLAN 0 to HW filter on device team0 [ 125.542806] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 125.550757] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 125.558515] bridge0: port 2(bridge_slave_1) entered blocking state [ 125.564896] bridge0: port 2(bridge_slave_1) entered forwarding state [ 125.573220] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 125.580480] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 125.588291] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 125.595997] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 125.608959] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 125.628837] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 125.637210] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 125.644924] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 125.652509] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.658827] bridge0: port 1(bridge_slave_0) entered forwarding state [ 125.665852] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 125.673917] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 125.683593] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 125.752037] device hsr_slave_0 entered promiscuous mode [ 125.790348] device hsr_slave_1 entered promiscuous mode [ 125.833651] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 125.842651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 125.850453] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 125.857938] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 125.865540] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 125.877249] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 125.887222] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 125.894502] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 125.904685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 125.914391] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 125.922033] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 125.929598] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 125.937211] bridge0: port 2(bridge_slave_1) entered blocking state [ 125.943577] bridge0: port 2(bridge_slave_1) entered forwarding state [ 125.950901] chnl_net:caif_netlink_parms(): no params data found [ 125.961832] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 125.972242] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 125.980694] 8021q: adding VLAN 0 to HW filter on device bond0 [ 125.989799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 125.999119] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 126.007414] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 126.021535] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 126.029807] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 126.041948] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 126.048101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 126.055890] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 126.063343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 126.072586] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 126.083349] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 126.094548] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 126.101083] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 126.116506] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 126.127410] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 126.134557] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 126.142670] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 126.150946] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 126.158390] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 126.166114] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 126.177620] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 126.187262] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 126.212098] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.218482] bridge0: port 1(bridge_slave_0) entered disabled state [ 126.225893] device bridge_slave_0 entered promiscuous mode [ 126.232155] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 126.238926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 126.245871] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 126.253392] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 126.265712] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 126.273070] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 126.279902] bridge0: port 2(bridge_slave_1) entered blocking state [ 126.286555] bridge0: port 2(bridge_slave_1) entered disabled state [ 126.293929] device bridge_slave_1 entered promiscuous mode [ 126.310925] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 126.318339] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 126.327507] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 126.333923] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 126.346445] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 126.354862] 8021q: adding VLAN 0 to HW filter on device team0 [ 126.366355] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 126.375905] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 126.387067] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 126.408010] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 126.415548] team0: Port device team_slave_0 added [ 126.421196] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 126.428208] team0: Port device team_slave_1 added [ 126.437344] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 126.445276] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 126.454440] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 126.462627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 126.474296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 126.481846] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.488174] bridge0: port 1(bridge_slave_0) entered forwarding state [ 126.501777] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 126.508401] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 126.530659] 8021q: adding VLAN 0 to HW filter on device bond0 [ 126.542440] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 126.550818] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 126.566411] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 126.573911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 126.582244] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 126.589767] bridge0: port 2(bridge_slave_1) entered blocking state [ 126.596132] bridge0: port 2(bridge_slave_1) entered forwarding state [ 126.609246] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 126.619666] 8021q: adding VLAN 0 to HW filter on device bond0 10:21:25 executing program 0: [ 126.628882] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready 10:21:25 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) [ 126.672813] device hsr_slave_0 entered promiscuous mode [ 126.698190] audit: type=1400 audit(1568802085.609:39): avc: denied { map } for pid=6896 comm="syz-executor.0" path="/dev/nullb0" dev="devtmpfs" ino=304 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=blk_file permissive=1 [ 126.730246] device hsr_slave_1 entered promiscuous mode [ 126.780822] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 126.787679] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 126.794800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 126.802502] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 126.809295] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 126.817771] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 126.825613] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 126.834650] 8021q: adding VLAN 0 to HW filter on device team0 [ 126.842959] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 126.854280] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 126.869288] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 126.882342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 126.889913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 126.904114] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 126.912155] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.918500] bridge0: port 1(bridge_slave_0) entered forwarding state [ 126.925400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready 10:21:25 executing program 0: socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000fbe000)={0x0, 0x0}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6(0xa, 0x3, 0x1) close(r0) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000cc0)={0x0, @in6={{0xa, 0x0, 0xfffffffffffffff9, @mcast2}}}, 0x90) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000680)={{}, {}, [{0x2, 0x1}, {}], {}, [{}]}, 0x3c, 0x1) memfd_create(&(0x7f0000000240)='^i\xa3\xa2\x8a\xf2\xa8\x10LB\xbe\ra\\\xfaH\xb7/\x81\x8c!\x82r\xc0\x12\xa3\xc9\xee\xbb\x88\x87\x06\x00\x00\x00V+d\xad\xea-vG\xc5\x92d\xbdllz\v7\xdfsa\xb0\xfbV\x13\x1a\xfa\xb8\xeb\x8d\xcd\x00\x17~\x01\x83\'k\xad\xf0\xf1$\x18\xf9\xcf\x8c\b\x7f\xb0@\xd7\xcci\xddW\xedA\f\x97m+\xfd\aWdE\xb8\x94+\xcb\xb9\xf5\xcaXo\xfb\xc8\xb1yY9\x0e\x10]\xa8\x15\xbe\xc8E0j\xa0\xb9\xa2\x19>Eh?\xf3\xf4\xb4\xd5\n\xe9\xc0?\x13\xec\x13{\xe1\xbc\\\xc8\xc5\xbe\xe7\x12\xe7\x80tT5\xe4\x88\xd9m\xe4\xfbq?WRZ\x84b\xb5\x032\xc1\x8a\xaaE\xc6\xb2Aa\xfd\xac\xe5N@\xec\xf0\x7f\xbb$\b;2Ue\xef\x919\xad\x8dH [\xf3Q\x170xffffffffffffffff}) sync_file_range(r1, 0x0, 0xfffffffffffffffe, 0x0) [ 127.025618] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 127.038020] bridge0: port 2(bridge_slave_1) entered blocking state [ 127.044418] bridge0: port 2(bridge_slave_1) entered forwarding state [ 127.056331] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 127.065284] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 127.074423] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 127.083321] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 127.091633] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 127.099090] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 127.107317] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 127.115773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 127.124840] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 127.132713] bridge0: port 1(bridge_slave_0) entered blocking state [ 127.139100] bridge0: port 1(bridge_slave_0) entered forwarding state [ 127.146279] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 127.155720] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 127.165417] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready 10:21:26 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000000c0)={r2}) [ 127.174746] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 127.183951] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 127.191246] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 127.198962] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 127.211777] bridge0: port 2(bridge_slave_1) entered blocking state [ 127.218130] bridge0: port 2(bridge_slave_1) entered forwarding state 10:21:26 executing program 5: syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x0) close(r0) [ 127.228814] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 127.232067] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 127.251943] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 127.261186] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 127.271701] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 127.280493] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 127.292153] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 127.301657] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 127.317057] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 127.326013] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 127.333134] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 127.339991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 127.348830] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 127.356607] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 127.364333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 127.372016] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 127.379269] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 127.386726] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 127.394116] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 127.401945] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 127.410179] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 10:21:26 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4004af61, &(0x7f0000000180)) [ 127.442385] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 127.449861] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 127.461028] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 127.467031] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 127.491794] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 127.497868] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 127.507961] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 127.524617] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 10:21:26 executing program 0: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000140)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3235004000000f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4d}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x200, 0x0) ioctl$KDGETKEYCODE(r3, 0x4b4c, &(0x7f0000000280)={0x1, 0xfffffffffffff638}) ioctl$KVM_SET_PIT2(0xffffffffffffffff, 0x4070aea0, &(0x7f0000000200)={[{0x9, 0x8, 0x38b, 0x0, 0x0, 0x7fffffff, 0x0, 0x41, 0x0, 0xadfd, 0x1, 0x0, 0x7}, {0x100, 0x80, 0xfffffffffffffff8, 0x100, 0x6, 0x0, 0x400000000000000, 0x0, 0x27, 0x3, 0x6, 0x3, 0xffffffff}, {0x0, 0xf6, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x1, 0x0, 0x0, 0x84fe, 0x27948fb0}], 0x3}) ioctl$KVM_RUN(r2, 0xae80, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x80000) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) getresuid(&(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000004c0)) r4 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000600)='./file0/f.le.\x00', r4, &(0x7f00000005c0)='./file0/f.le.\x00') r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) accept$packet(r5, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001880)=0x14) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000240)='.//ile0\x00', r6, &(0x7f00000007c0)='./file2\x00') mkdirat(r6, &(0x7f00000003c0)='./file0/f.le.\x00', 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f00000018c0), &(0x7f0000001900)=0xc) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r8, &(0x7f0000000240)='.//ile0\x00', 0xffffffffffffffff, &(0x7f00000007c0)='./file2\x00') mkdirat(r8, 0x0, 0x0) accept$packet(r8, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001880)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000018c0)={0x0, 0x0}, &(0x7f0000001900)=0xc) setsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000001940)={{{@in6=@remote, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e22, 0x6, 0x4e23, 0x100, 0x2, 0x40, 0xa0, 0x6c, r9, r10}, {0x8, 0x6, 0x3, 0x5, 0x1, 0x0, 0x7fff, 0x100000001}, {0x6, 0x1d, 0x424, 0x6}, 0x200, 0x0, 0x2, 0x3, 0x1, 0x1}, {{@in, 0x4d5, 0x958f07e70454f131}, 0x2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3503, 0x4, 0x2, 0xb20, 0x7}}, 0xe8) r11 = open(&(0x7f0000000740)='./file0\x00', 0x8000, 0x37e6a71284dfed) renameat(0xffffffffffffffff, &(0x7f0000000240)='.//ile0\x00', r11, &(0x7f00000007c0)='./file2\x00') renameat(0xffffffffffffffff, &(0x7f0000000240)='.//ile0\x00', 0xffffffffffffffff, &(0x7f00000007c0)='./file2\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001880)=0x14) r12 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r12, &(0x7f0000000240)='.//ile0\x00', r12, &(0x7f00000007c0)='./file2\x00') mkdirat(r12, &(0x7f00000003c0)='./file0/f.le.\x00', 0x0) getsockopt$sock_cred(r12, 0x1, 0x11, 0x0, 0x0) geteuid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) getpgid(0xffffffffffffffff) r13 = getegid() r14 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r14, &(0x7f00000087c0)={0x0, 0x0, &(0x7f0000008780)={&(0x7f00000086c0)=ANY=[@ANYBLOB="e85dc7ea118b9d13cd2a", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x100) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in=@multicast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xe8) ioprio_get$uid(0x3, r15) getegid() getegid() setregid(0xffffffffffffffff, 0x0) getegid() setregid(0xffffffffffffffff, 0x0) r16 = getegid() setregid(0xffffffffffffffff, r16) getegid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in=@multicast1, @in=@local}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) ioprio_get$uid(0x3, 0x0) r17 = getegid() r18 = syz_open_procfs(0x0, 0x0) sendmsg$unix(r18, &(0x7f0000000c80)={&(0x7f0000000940)=@file={0x78ea9056d3cbc55f, './file0\x00'}, 0x6e, &(0x7f0000000ac0)=[{0x0}, {&(0x7f00000009c0)="8e4ab77bc12cddf9642b8c4a20e9caf80f866679ea2023ed5124e574afe69a99423204fc569a4e3bb1e271e9afb221fed0eed260e1a22dde6052be2feef376e84338e0efc0a5c99c18305ce795f318da77c4406bc5cb5e1d7a37052a5250af853dbe19c05885334430610235209b9a7713e712dd15fed759747cb9518190dea6eece", 0x82}], 0x2, &(0x7f0000000c00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r13}}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r17}}}], 0x60, 0x200640d0}, 0x4008000) getegid() setregid(0xffffffffffffffff, 0x0) getegid() setregid(0xffffffffffffffff, 0x0) [ 127.539299] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 127.547561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 127.560992] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 127.568690] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 127.580161] hrtimer: interrupt took 26814 ns [ 127.585681] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 127.604854] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 127.612531] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 127.625913] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 127.637727] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 127.652321] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 127.672962] 8021q: adding VLAN 0 to HW filter on device bond0 [ 127.680922] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 127.689728] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 127.713893] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 127.722656] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 127.737236] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 127.745729] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 127.758708] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 127.775163] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 127.783656] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 127.794025] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 127.802456] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 127.814890] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 127.821702] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 127.847766] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 127.857446] 8021q: adding VLAN 0 to HW filter on device team0 [ 127.866949] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 127.875070] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 127.887990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 127.899208] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 127.907153] bridge0: port 1(bridge_slave_0) entered blocking state [ 127.913538] bridge0: port 1(bridge_slave_0) entered forwarding state [ 127.932092] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 127.945272] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 127.953117] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 127.961219] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 127.968853] bridge0: port 2(bridge_slave_1) entered blocking state [ 127.975223] bridge0: port 2(bridge_slave_1) entered forwarding state [ 127.984909] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 127.995810] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 128.002579] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 128.012929] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 128.024945] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 128.035627] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 128.061386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 128.069015] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 128.092245] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 128.108939] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 128.133343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 128.146077] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 128.156361] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 128.164601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 128.177326] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 128.187291] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 128.195656] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 128.205895] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 128.212228] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 128.219056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 128.227027] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 128.239318] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 128.251290] 8021q: adding VLAN 0 to HW filter on device batadv0 10:21:27 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000002, 0x0, 0x0, 0x8004, &(0x7f0000002c40)=ANY=[@ANYBLOB='errors=recover,nls=cp855']) 10:21:27 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4004af61, &(0x7f0000000180)) 10:21:28 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$revoke(0x3, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000000)={{0x3, 0x3, 0x7, 0x0, 0x1}}) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000100)="d353ff072d0400b4f4d4f60000030000002272a062b49232e134e85da7bf155ef74de2d504f04c8379255ef57c4189149253303d25713090b4bab248e2be30a506272cd585c567858a82053222021a24f57e3ccf664c90f6cc39be4332f4c75416833562378c1dc49a31eb0a69f8e6a00d0c7993fe73877b7eb8d75860717b6951fdf77e56261c1916c90b29f7") 10:21:28 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @remote, @dev}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000280)=ANY=[@ANYBLOB="e0000002ac1414bb0000000005000000e000000200020000e000000102950000000000aafaebbfc459597a2ef4b1212a8a9d81c7f4c3c7c09037fbb8b58489107d78dd3520ad869f3bc918fb5c5782963d1666756fe1fa6a0ed71f25cab1c69a8378ab6b4afaeb8c0eeac099b434e8d548bad10b81d7a2aa37f41cac93341da2029657fcf3e09897341f81808d8511f1901a575498c2d40ec0705bdd46a9f23eae0e9c6da8a0d14a4b16f039c045f2b637ac7d0978f543654fb33293258d327a2567b827b8721a8c054bc101c1d328e271fec691d9aebc435194109b7dc996e85ebddda9688db5c674dedf2a367c20f81a05082f7eeb4fa0aeb1fc8cac02f5f9582be88e84212aa8ceeced75c2db15a47aae4ca5009d4f9b6333ff9efca0cd4d02d3ea23fd110456c173b4a108539d2e728ed088925df55dd3d66032c267d6162a28f758114da8d6bc7591c600"/346], 0x24) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) 10:21:28 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x168}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/icmp\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 10:21:28 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000002, 0x0, 0x0, 0x8004, &(0x7f0000002c40)=ANY=[@ANYBLOB='errors=recover,nls=cp855']) 10:21:28 executing program 2: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000140)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3235004000000f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4d}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x200, 0x0) ioctl$KDGETKEYCODE(r3, 0x4b4c, &(0x7f0000000280)={0x1, 0xfffffffffffff638}) ioctl$KVM_SET_PIT2(0xffffffffffffffff, 0x4070aea0, &(0x7f0000000200)={[{0x9, 0x8, 0x38b, 0x0, 0x0, 0x7fffffff, 0x0, 0x41, 0x0, 0xadfd, 0x1, 0x0, 0x7}, {0x100, 0x80, 0xfffffffffffffff8, 0x100, 0x6, 0x0, 0x400000000000000, 0x0, 0x27, 0x3, 0x6, 0x3, 0xffffffff}, {0x0, 0xf6, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x1, 0x0, 0x0, 0x84fe, 0x27948fb0}], 0x3}) ioctl$KVM_RUN(r2, 0xae80, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x80000) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) getresuid(&(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000004c0)) r4 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000600)='./file0/f.le.\x00', r4, &(0x7f00000005c0)='./file0/f.le.\x00') r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) accept$packet(r5, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001880)=0x14) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000240)='.//ile0\x00', r6, &(0x7f00000007c0)='./file2\x00') mkdirat(r6, &(0x7f00000003c0)='./file0/f.le.\x00', 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f00000018c0), &(0x7f0000001900)=0xc) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r8, &(0x7f0000000240)='.//ile0\x00', 0xffffffffffffffff, &(0x7f00000007c0)='./file2\x00') mkdirat(r8, 0x0, 0x0) accept$packet(r8, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001880)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000018c0)={0x0, 0x0}, &(0x7f0000001900)=0xc) setsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000001940)={{{@in6=@remote, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e22, 0x6, 0x4e23, 0x100, 0x2, 0x40, 0xa0, 0x6c, r9, r10}, {0x8, 0x6, 0x3, 0x5, 0x1, 0x0, 0x7fff, 0x100000001}, {0x6, 0x1d, 0x424, 0x6}, 0x200, 0x0, 0x2, 0x3, 0x1, 0x1}, {{@in, 0x4d5, 0x958f07e70454f131}, 0x2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3503, 0x4, 0x2, 0xb20, 0x7}}, 0xe8) r11 = open(&(0x7f0000000740)='./file0\x00', 0x8000, 0x37e6a71284dfed) renameat(0xffffffffffffffff, &(0x7f0000000240)='.//ile0\x00', r11, &(0x7f00000007c0)='./file2\x00') renameat(0xffffffffffffffff, &(0x7f0000000240)='.//ile0\x00', 0xffffffffffffffff, &(0x7f00000007c0)='./file2\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001880)=0x14) r12 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r12, &(0x7f0000000240)='.//ile0\x00', r12, &(0x7f00000007c0)='./file2\x00') mkdirat(r12, &(0x7f00000003c0)='./file0/f.le.\x00', 0x0) getsockopt$sock_cred(r12, 0x1, 0x11, 0x0, 0x0) geteuid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) getpgid(0xffffffffffffffff) r13 = getegid() r14 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r14, &(0x7f00000087c0)={0x0, 0x0, &(0x7f0000008780)={&(0x7f00000086c0)=ANY=[@ANYBLOB="e85dc7ea118b9d13cd2a", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x100) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in=@multicast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xe8) ioprio_get$uid(0x3, r15) getegid() getegid() setregid(0xffffffffffffffff, 0x0) getegid() setregid(0xffffffffffffffff, 0x0) r16 = getegid() setregid(0xffffffffffffffff, r16) getegid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in=@multicast1, @in=@local}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) ioprio_get$uid(0x3, 0x0) r17 = getegid() r18 = syz_open_procfs(0x0, 0x0) sendmsg$unix(r18, &(0x7f0000000c80)={&(0x7f0000000940)=@file={0x78ea9056d3cbc55f, './file0\x00'}, 0x6e, &(0x7f0000000ac0)=[{0x0}, {&(0x7f00000009c0)="8e4ab77bc12cddf9642b8c4a20e9caf80f866679ea2023ed5124e574afe69a99423204fc569a4e3bb1e271e9afb221fed0eed260e1a22dde6052be2feef376e84338e0efc0a5c99c18305ce795f318da77c4406bc5cb5e1d7a37052a5250af853dbe19c05885334430610235209b9a7713e712dd15fed759747cb9518190dea6eece", 0x82}], 0x2, &(0x7f0000000c00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r13}}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r17}}}], 0x60, 0x200640d0}, 0x4008000) getegid() setregid(0xffffffffffffffff, 0x0) getegid() setregid(0xffffffffffffffff, 0x0) 10:21:28 executing program 0: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000140)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3235004000000f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4d}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x200, 0x0) ioctl$KDGETKEYCODE(r3, 0x4b4c, &(0x7f0000000280)={0x1, 0xfffffffffffff638}) ioctl$KVM_SET_PIT2(0xffffffffffffffff, 0x4070aea0, &(0x7f0000000200)={[{0x9, 0x8, 0x38b, 0x0, 0x0, 0x7fffffff, 0x0, 0x41, 0x0, 0xadfd, 0x1, 0x0, 0x7}, {0x100, 0x80, 0xfffffffffffffff8, 0x100, 0x6, 0x0, 0x400000000000000, 0x0, 0x27, 0x3, 0x6, 0x3, 0xffffffff}, {0x0, 0xf6, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x1, 0x0, 0x0, 0x84fe, 0x27948fb0}], 0x3}) ioctl$KVM_RUN(r2, 0xae80, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x80000) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) getresuid(&(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000004c0)) r4 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000600)='./file0/f.le.\x00', r4, &(0x7f00000005c0)='./file0/f.le.\x00') r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) accept$packet(r5, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001880)=0x14) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000240)='.//ile0\x00', r6, &(0x7f00000007c0)='./file2\x00') mkdirat(r6, &(0x7f00000003c0)='./file0/f.le.\x00', 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f00000018c0), &(0x7f0000001900)=0xc) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r8, &(0x7f0000000240)='.//ile0\x00', 0xffffffffffffffff, &(0x7f00000007c0)='./file2\x00') mkdirat(r8, 0x0, 0x0) accept$packet(r8, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001880)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000018c0)={0x0, 0x0}, &(0x7f0000001900)=0xc) setsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000001940)={{{@in6=@remote, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e22, 0x6, 0x4e23, 0x100, 0x2, 0x40, 0xa0, 0x6c, r9, r10}, {0x8, 0x6, 0x3, 0x5, 0x1, 0x0, 0x7fff, 0x100000001}, {0x6, 0x1d, 0x424, 0x6}, 0x200, 0x0, 0x2, 0x3, 0x1, 0x1}, {{@in, 0x4d5, 0x958f07e70454f131}, 0x2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3503, 0x4, 0x2, 0xb20, 0x7}}, 0xe8) r11 = open(&(0x7f0000000740)='./file0\x00', 0x8000, 0x37e6a71284dfed) renameat(0xffffffffffffffff, &(0x7f0000000240)='.//ile0\x00', r11, &(0x7f00000007c0)='./file2\x00') renameat(0xffffffffffffffff, &(0x7f0000000240)='.//ile0\x00', 0xffffffffffffffff, &(0x7f00000007c0)='./file2\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001880)=0x14) r12 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r12, &(0x7f0000000240)='.//ile0\x00', r12, &(0x7f00000007c0)='./file2\x00') mkdirat(r12, &(0x7f00000003c0)='./file0/f.le.\x00', 0x0) getsockopt$sock_cred(r12, 0x1, 0x11, 0x0, 0x0) geteuid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) getpgid(0xffffffffffffffff) r13 = getegid() r14 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r14, &(0x7f00000087c0)={0x0, 0x0, &(0x7f0000008780)={&(0x7f00000086c0)=ANY=[@ANYBLOB="e85dc7ea118b9d13cd2a", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x100) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in=@multicast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xe8) ioprio_get$uid(0x3, r15) getegid() getegid() setregid(0xffffffffffffffff, 0x0) getegid() setregid(0xffffffffffffffff, 0x0) r16 = getegid() setregid(0xffffffffffffffff, r16) getegid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in=@multicast1, @in=@local}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) ioprio_get$uid(0x3, 0x0) r17 = getegid() r18 = syz_open_procfs(0x0, 0x0) sendmsg$unix(r18, &(0x7f0000000c80)={&(0x7f0000000940)=@file={0x78ea9056d3cbc55f, './file0\x00'}, 0x6e, &(0x7f0000000ac0)=[{0x0}, {&(0x7f00000009c0)="8e4ab77bc12cddf9642b8c4a20e9caf80f866679ea2023ed5124e574afe69a99423204fc569a4e3bb1e271e9afb221fed0eed260e1a22dde6052be2feef376e84338e0efc0a5c99c18305ce795f318da77c4406bc5cb5e1d7a37052a5250af853dbe19c05885334430610235209b9a7713e712dd15fed759747cb9518190dea6eece", 0x82}], 0x2, &(0x7f0000000c00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r13}}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r17}}}], 0x60, 0x200640d0}, 0x4008000) getegid() setregid(0xffffffffffffffff, 0x0) getegid() setregid(0xffffffffffffffff, 0x0) 10:21:28 executing program 4: unshare(0x400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x18) 10:21:28 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x168}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/icmp\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 10:21:28 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000002, 0x0, 0x0, 0x8004, &(0x7f0000002c40)=ANY=[@ANYBLOB='errors=recover,nls=cp855']) 10:21:28 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x168}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/icmp\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 10:21:28 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, &(0x7f00000000c0), 0x0}, 0x18) 10:21:28 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$key(0xffffffffffffffff, &(0x7f0000001700)={0x0, 0x0, &(0x7f0000001580)}, 0x0) pause() r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x10219) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa47475}, 0x100) 10:21:29 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x14102e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x800002, 0x11, r1, 0x0) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000251000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 10:21:29 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000002, 0x0, 0x0, 0x8004, &(0x7f0000002c40)=ANY=[@ANYBLOB='errors=recover,nls=cp855']) 10:21:29 executing program 4: socket$inet(0x2, 0x4000020000000001, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000001400)='./file0\x00', &(0x7f0000001540)='trusted.overlay.origin\x00', 0x0, 0x0, 0x1) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$EVIOCGSND(r2, 0x8040451a, &(0x7f0000001940)=""/199) pause() setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, 0x0, 0xfffffffffffffff7) pipe(&(0x7f0000000300)) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r3, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r3, &(0x7f0000000380)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x10219) recvmsg(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa47475}, 0x100) 10:21:29 executing program 0: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000140)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3235004000000f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4d}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x200, 0x0) ioctl$KDGETKEYCODE(r3, 0x4b4c, &(0x7f0000000280)={0x1, 0xfffffffffffff638}) ioctl$KVM_SET_PIT2(0xffffffffffffffff, 0x4070aea0, &(0x7f0000000200)={[{0x9, 0x8, 0x38b, 0x0, 0x0, 0x7fffffff, 0x0, 0x41, 0x0, 0xadfd, 0x1, 0x0, 0x7}, {0x100, 0x80, 0xfffffffffffffff8, 0x100, 0x6, 0x0, 0x400000000000000, 0x0, 0x27, 0x3, 0x6, 0x3, 0xffffffff}, {0x0, 0xf6, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x1, 0x0, 0x0, 0x84fe, 0x27948fb0}], 0x3}) ioctl$KVM_RUN(r2, 0xae80, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x80000) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) getresuid(&(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000004c0)) r4 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000600)='./file0/f.le.\x00', r4, &(0x7f00000005c0)='./file0/f.le.\x00') r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) accept$packet(r5, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001880)=0x14) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000240)='.//ile0\x00', r6, &(0x7f00000007c0)='./file2\x00') mkdirat(r6, &(0x7f00000003c0)='./file0/f.le.\x00', 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f00000018c0), &(0x7f0000001900)=0xc) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r8, &(0x7f0000000240)='.//ile0\x00', 0xffffffffffffffff, &(0x7f00000007c0)='./file2\x00') mkdirat(r8, 0x0, 0x0) accept$packet(r8, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001880)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000018c0)={0x0, 0x0}, &(0x7f0000001900)=0xc) setsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000001940)={{{@in6=@remote, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e22, 0x6, 0x4e23, 0x100, 0x2, 0x40, 0xa0, 0x6c, r9, r10}, {0x8, 0x6, 0x3, 0x5, 0x1, 0x0, 0x7fff, 0x100000001}, {0x6, 0x1d, 0x424, 0x6}, 0x200, 0x0, 0x2, 0x3, 0x1, 0x1}, {{@in, 0x4d5, 0x958f07e70454f131}, 0x2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3503, 0x4, 0x2, 0xb20, 0x7}}, 0xe8) r11 = open(&(0x7f0000000740)='./file0\x00', 0x8000, 0x37e6a71284dfed) renameat(0xffffffffffffffff, &(0x7f0000000240)='.//ile0\x00', r11, &(0x7f00000007c0)='./file2\x00') renameat(0xffffffffffffffff, &(0x7f0000000240)='.//ile0\x00', 0xffffffffffffffff, &(0x7f00000007c0)='./file2\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001880)=0x14) r12 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r12, &(0x7f0000000240)='.//ile0\x00', r12, &(0x7f00000007c0)='./file2\x00') mkdirat(r12, &(0x7f00000003c0)='./file0/f.le.\x00', 0x0) getsockopt$sock_cred(r12, 0x1, 0x11, 0x0, 0x0) geteuid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) getpgid(0xffffffffffffffff) r13 = getegid() r14 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r14, &(0x7f00000087c0)={0x0, 0x0, &(0x7f0000008780)={&(0x7f00000086c0)=ANY=[@ANYBLOB="e85dc7ea118b9d13cd2a", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x100) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in=@multicast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xe8) ioprio_get$uid(0x3, r15) getegid() getegid() setregid(0xffffffffffffffff, 0x0) getegid() setregid(0xffffffffffffffff, 0x0) r16 = getegid() setregid(0xffffffffffffffff, r16) getegid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in=@multicast1, @in=@local}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) ioprio_get$uid(0x3, 0x0) r17 = getegid() r18 = syz_open_procfs(0x0, 0x0) sendmsg$unix(r18, &(0x7f0000000c80)={&(0x7f0000000940)=@file={0x78ea9056d3cbc55f, './file0\x00'}, 0x6e, &(0x7f0000000ac0)=[{0x0}, {&(0x7f00000009c0)="8e4ab77bc12cddf9642b8c4a20e9caf80f866679ea2023ed5124e574afe69a99423204fc569a4e3bb1e271e9afb221fed0eed260e1a22dde6052be2feef376e84338e0efc0a5c99c18305ce795f318da77c4406bc5cb5e1d7a37052a5250af853dbe19c05885334430610235209b9a7713e712dd15fed759747cb9518190dea6eece", 0x82}], 0x2, &(0x7f0000000c00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r13}}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r17}}}], 0x60, 0x200640d0}, 0x4008000) getegid() setregid(0xffffffffffffffff, 0x0) getegid() setregid(0xffffffffffffffff, 0x0) 10:21:29 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x168}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/icmp\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 10:21:29 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x168}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/icmp\x00') socket$inet_udplite(0x2, 0x2, 0x88) preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 10:21:29 executing program 1: syz_mount_image$ntfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x1000002, 0x0, 0x0, 0x8004, &(0x7f0000002c40)=ANY=[@ANYBLOB='errors=recover,nls=cp855']) 10:21:29 executing program 3: socket$inet(0x2, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x10219) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa47475}, 0x100) 10:21:29 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x168}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/icmp\x00') socket$inet_udplite(0x2, 0x2, 0x88) preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 10:21:29 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x168}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/icmp\x00') socket$inet_udplite(0x2, 0x2, 0x88) preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 10:21:29 executing program 0: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000140)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3235004000000f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4d}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x200, 0x0) ioctl$KDGETKEYCODE(r3, 0x4b4c, &(0x7f0000000280)={0x1, 0xfffffffffffff638}) ioctl$KVM_SET_PIT2(0xffffffffffffffff, 0x4070aea0, &(0x7f0000000200)={[{0x9, 0x8, 0x38b, 0x0, 0x0, 0x7fffffff, 0x0, 0x41, 0x0, 0xadfd, 0x1, 0x0, 0x7}, {0x100, 0x80, 0xfffffffffffffff8, 0x100, 0x6, 0x0, 0x400000000000000, 0x0, 0x27, 0x3, 0x6, 0x3, 0xffffffff}, {0x0, 0xf6, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x1, 0x0, 0x0, 0x84fe, 0x27948fb0}], 0x3}) ioctl$KVM_RUN(r2, 0xae80, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x80000) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) getresuid(&(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000004c0)) r4 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000600)='./file0/f.le.\x00', r4, &(0x7f00000005c0)='./file0/f.le.\x00') r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) accept$packet(r5, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001880)=0x14) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000240)='.//ile0\x00', r6, &(0x7f00000007c0)='./file2\x00') mkdirat(r6, &(0x7f00000003c0)='./file0/f.le.\x00', 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f00000018c0), &(0x7f0000001900)=0xc) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r8, &(0x7f0000000240)='.//ile0\x00', 0xffffffffffffffff, &(0x7f00000007c0)='./file2\x00') mkdirat(r8, 0x0, 0x0) accept$packet(r8, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001880)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000018c0)={0x0, 0x0}, &(0x7f0000001900)=0xc) setsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000001940)={{{@in6=@remote, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e22, 0x6, 0x4e23, 0x100, 0x2, 0x40, 0xa0, 0x6c, r9, r10}, {0x8, 0x6, 0x3, 0x5, 0x1, 0x0, 0x7fff, 0x100000001}, {0x6, 0x1d, 0x424, 0x6}, 0x200, 0x0, 0x2, 0x3, 0x1, 0x1}, {{@in, 0x4d5, 0x958f07e70454f131}, 0x2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3503, 0x4, 0x2, 0xb20, 0x7}}, 0xe8) r11 = open(&(0x7f0000000740)='./file0\x00', 0x8000, 0x37e6a71284dfed) renameat(0xffffffffffffffff, &(0x7f0000000240)='.//ile0\x00', r11, &(0x7f00000007c0)='./file2\x00') renameat(0xffffffffffffffff, &(0x7f0000000240)='.//ile0\x00', 0xffffffffffffffff, &(0x7f00000007c0)='./file2\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001880)=0x14) r12 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r12, &(0x7f0000000240)='.//ile0\x00', r12, &(0x7f00000007c0)='./file2\x00') mkdirat(r12, &(0x7f00000003c0)='./file0/f.le.\x00', 0x0) getsockopt$sock_cred(r12, 0x1, 0x11, 0x0, 0x0) geteuid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) getpgid(0xffffffffffffffff) r13 = getegid() r14 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r14, &(0x7f00000087c0)={0x0, 0x0, &(0x7f0000008780)={&(0x7f00000086c0)=ANY=[@ANYBLOB="e85dc7ea118b9d13cd2a", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x100) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in=@multicast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xe8) ioprio_get$uid(0x3, r15) getegid() getegid() setregid(0xffffffffffffffff, 0x0) getegid() setregid(0xffffffffffffffff, 0x0) r16 = getegid() setregid(0xffffffffffffffff, r16) getegid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in=@multicast1, @in=@local}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) ioprio_get$uid(0x3, 0x0) r17 = getegid() r18 = syz_open_procfs(0x0, 0x0) sendmsg$unix(r18, &(0x7f0000000c80)={&(0x7f0000000940)=@file={0x78ea9056d3cbc55f, './file0\x00'}, 0x6e, &(0x7f0000000ac0)=[{0x0}, {&(0x7f00000009c0)="8e4ab77bc12cddf9642b8c4a20e9caf80f866679ea2023ed5124e574afe69a99423204fc569a4e3bb1e271e9afb221fed0eed260e1a22dde6052be2feef376e84338e0efc0a5c99c18305ce795f318da77c4406bc5cb5e1d7a37052a5250af853dbe19c05885334430610235209b9a7713e712dd15fed759747cb9518190dea6eece", 0x82}], 0x2, &(0x7f0000000c00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r13}}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r17}}}], 0x60, 0x200640d0}, 0x4008000) getegid() setregid(0xffffffffffffffff, 0x0) getegid() setregid(0xffffffffffffffff, 0x0) 10:21:29 executing program 2: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r1, &(0x7f0000000380)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x10219) recvmsg(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa47475}, 0x100) 10:21:29 executing program 1: syz_mount_image$ntfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x1000002, 0x0, 0x0, 0x8004, &(0x7f0000002c40)=ANY=[@ANYBLOB='errors=recover,nls=cp855']) 10:21:29 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x168}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/icmp\x00') ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 10:21:29 executing program 4: 10:21:29 executing program 1: syz_mount_image$ntfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x1000002, 0x0, 0x0, 0x8004, &(0x7f0000002c40)=ANY=[@ANYBLOB='errors=recover,nls=cp855']) 10:21:29 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x168}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/icmp\x00') ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 10:21:29 executing program 3: 10:21:29 executing program 0: 10:21:29 executing program 0: 10:21:29 executing program 4: 10:21:29 executing program 3: 10:21:30 executing program 0: 10:21:30 executing program 4: 10:21:30 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x168}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/icmp\x00') ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 10:21:30 executing program 3: 10:21:30 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', 0x0, 0x1000002, 0x0, 0x0, 0x8004, &(0x7f0000002c40)=ANY=[@ANYBLOB='errors=recover,nls=cp855']) 10:21:30 executing program 2: 10:21:30 executing program 0: 10:21:30 executing program 4: 10:21:30 executing program 0: 10:21:30 executing program 2: 10:21:30 executing program 3: 10:21:30 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', 0x0, 0x1000002, 0x0, 0x0, 0x8004, &(0x7f0000002c40)=ANY=[@ANYBLOB='errors=recover,nls=cp855']) 10:21:30 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x168}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3a8, 0x0) 10:21:30 executing program 4: 10:21:30 executing program 3: 10:21:30 executing program 0: 10:21:30 executing program 2: 10:21:30 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x168}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3a8, 0x0) 10:21:30 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', 0x0, 0x1000002, 0x0, 0x0, 0x8004, &(0x7f0000002c40)=ANY=[@ANYBLOB='errors=recover,nls=cp855']) 10:21:30 executing program 4: 10:21:30 executing program 0: 10:21:30 executing program 3: 10:21:30 executing program 2: 10:21:30 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x8004, &(0x7f0000002c40)=ANY=[@ANYBLOB='errors=recover,nls=cp855']) 10:21:30 executing program 4: 10:21:30 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x168}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3a8, 0x0) 10:21:30 executing program 0: 10:21:30 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/icmp\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 10:21:30 executing program 4: 10:21:30 executing program 2: 10:21:30 executing program 0: 10:21:30 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x8004, &(0x7f0000002c40)=ANY=[@ANYBLOB='errors=recover,nls=cp855']) 10:21:30 executing program 3: 10:21:30 executing program 4: 10:21:30 executing program 2: 10:21:30 executing program 0: 10:21:30 executing program 4: 10:21:30 executing program 3: 10:21:30 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/icmp\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 10:21:30 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x8004, &(0x7f0000002c40)=ANY=[@ANYBLOB='errors=recover,nls=cp855']) 10:21:30 executing program 2: 10:21:30 executing program 4: 10:21:30 executing program 0: 10:21:30 executing program 3: 10:21:30 executing program 4: 10:21:30 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/icmp\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 10:21:30 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000002, 0x0, 0x0, 0x0, &(0x7f0000002c40)=ANY=[@ANYBLOB='errors=recover,nls=cp855']) 10:21:30 executing program 0: 10:21:30 executing program 2: 10:21:30 executing program 3: 10:21:30 executing program 4: 10:21:30 executing program 0: 10:21:30 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/icmp\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 10:21:30 executing program 2: 10:21:30 executing program 3: [ 132.016983] ntfs: (device loop1): read_ntfs_boot_sector(): Primary boot sector is invalid. 10:21:31 executing program 4: 10:21:31 executing program 0: 10:21:31 executing program 3: [ 132.092286] ntfs: (device loop1): read_ntfs_boot_sector(): Could not find a valid backup boot sector. [ 132.172970] ntfs: (device loop1): ntfs_fill_super(): Not an NTFS volume. 10:21:31 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000002, 0x0, 0x0, 0x0, &(0x7f0000002c40)=ANY=[@ANYBLOB='errors=recover,nls=cp855']) 10:21:31 executing program 2: 10:21:31 executing program 4: 10:21:31 executing program 0: 10:21:31 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/icmp\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 10:21:31 executing program 3: 10:21:31 executing program 4: 10:21:31 executing program 3: 10:21:31 executing program 0: 10:21:31 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/icmp\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 10:21:31 executing program 2: 10:21:31 executing program 3: [ 132.338394] ntfs: (device loop1): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 132.404088] ntfs: (device loop1): read_ntfs_boot_sector(): Could not find a valid backup boot sector. 10:21:31 executing program 4: 10:21:31 executing program 0: 10:21:31 executing program 3: 10:21:31 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/icmp\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) [ 132.470376] ntfs: (device loop1): ntfs_fill_super(): Not an NTFS volume. 10:21:31 executing program 2: 10:21:31 executing program 3: 10:21:31 executing program 4: 10:21:31 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/icmp\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 10:21:31 executing program 2: 10:21:31 executing program 0: 10:21:31 executing program 3: 10:21:31 executing program 4: 10:21:31 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000002, 0x0, 0x0, 0x0, &(0x7f0000002c40)=ANY=[@ANYBLOB='errors=recover,nls=cp855']) 10:21:31 executing program 2: 10:21:31 executing program 0: 10:21:31 executing program 4: 10:21:31 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/icmp\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 10:21:31 executing program 3: 10:21:31 executing program 0: 10:21:31 executing program 2: [ 132.739482] ntfs: (device loop1): read_ntfs_boot_sector(): Primary boot sector is invalid. 10:21:31 executing program 4: 10:21:31 executing program 0: 10:21:31 executing program 3: 10:21:31 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/icmp\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) [ 132.825478] ntfs: (device loop1): read_ntfs_boot_sector(): Could not find a valid backup boot sector. [ 132.898872] ntfs: (device loop1): ntfs_fill_super(): Not an NTFS volume. 10:21:31 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000002, 0x0, 0x0, 0x8004, 0x0) 10:21:31 executing program 2: 10:21:31 executing program 4: 10:21:31 executing program 0: 10:21:31 executing program 3: 10:21:31 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/icmp\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 10:21:31 executing program 0: 10:21:31 executing program 3: 10:21:31 executing program 4: 10:21:31 executing program 0: 10:21:31 executing program 2: 10:21:32 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000002, 0x0, 0x0, 0x8004, 0x0) 10:21:32 executing program 3: 10:21:32 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/icmp\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 10:21:32 executing program 4: 10:21:32 executing program 2: 10:21:32 executing program 0: 10:21:32 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) 10:21:32 executing program 4: 10:21:32 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x168}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 10:21:32 executing program 2: 10:21:32 executing program 0: 10:21:32 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000002, 0x0, 0x0, 0x8004, 0x0) 10:21:32 executing program 0: 10:21:32 executing program 4: 10:21:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreq(r1, 0x0, 0x17, 0x0, 0x0) 10:21:32 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x11, 0x4, 0x4, 0x4, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0xff) 10:21:32 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000940)={&(0x7f0000000980)=ANY=[], &(0x7f0000000840)=""/200, 0x0, 0xc8, 0x1}, 0x20) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x10000) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\a\xd2\x8f(.\xf6\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+\x8d\xed\xa6\\\x1c\xc3\x97\x94\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\x15v$\xc5\xbcq\x9a\t\x9ej5)\x00\x00\x009\x8c4\xc4\x88C\xa2B\x8b\x81\v\xea\t\xf0\x8fw\a\f\x15\xe2\xd0q\xbb\t\xbf\x85\x98q\v\xd8D\xab9(\xf6.\x15\xcd2-\xf2\xc4\xd8\x00a\xd5\xd9\xb5Z\xd7\xb4\xac\x1d_+k\xd6\x8ag\xdceHE\xd5\x1c\x8a\xbd#\xcc\x82\xca\xc2(\xb6\xe1\x99p\x9b\xa3D\xd2\x91\x96\xef\x05\fv\x16\x14\xcc\xea\x9d\x11w\x1e\xb5VG\x9ad\x9a`=^h\x8c8\xc9\"\x1eO\xb5vk\xc9\xcfi\x90\xd7\xd3H\xa1\xb4\xda\v\x17\x95\xf7\x19\x99\x99\x92\xc3\xc0\x8a\x18\xc7\"g\xd7B\x8f\x85\x18\xf3\x02\xa7\xb6\x83\x92\xefY\xef\x85\x92\x10E\x18\xbc\xacy\xd6\xa7Wh\xcd\xd0\xfa\xcc\xde\xeb\xdf\xad\xfd\xb0\xee\xfb\xc2(\x8cj\xd0uj{4\xb2\xe1p\x88u6\x9a;\xaa\x9f+J\x9e\xe3\xcc\xc7O\xad\x84\x8c;\x92~,\x15\xb2\x97\f~\xa0W\x16\x8b\a\x88\xaa\xe4C\xaf\x90\xdf\x7f\xe51\x00/n\xb5f\x1a\x8c+\xea<\xe3N@\x9e\xec\xbe{\x90x\xc6\x95\xe1I\x1d\xcbY\xe1\x01\xd2d\xae\xd1(>\xa3\xa9\x93\x16\xc6G\x94|\x00\x00\x00\x00\x00\x00\x00\x00', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) gettid() open$dir(0x0, 0x6000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x2000000000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:21:32 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000002, 0x0, 0x0, 0x8004, &(0x7f0000002c40)=ANY=[]) 10:21:32 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x168}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 10:21:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x17, 0x0, 0x0) 10:21:32 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000040)={0x0, 0x7, 0x0, [], &(0x7f0000000000)={0x0, 0x0, [], @value64}}) 10:21:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreq(r1, 0x0, 0x17, 0x0, 0x0) 10:21:32 executing program 4: get_mempolicy(0x0, &(0x7f0000000140), 0x7, &(0x7f0000ffd000/0x3000)=nil, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000180)="7696e8456e38ff5e506c85874877f97a4cf546fedb56b85502a6f89cebe26e42c5d452a88aaf45bed2a7852962c234fb6e53a968be79a5423f0cd3fb675ca891286bd048379ddcdc1871b0ace8410d0267bd4ebc8451fa56fb86e0c4a0e9ac697a6bb56910af76bd15fbbdc5ba07debfa8458a394bb953dda9ffc45ab29e6c3d24d3719c9a7ab735ff1655011c172b5b6bf193d7e3c94c203928bebbf96d7a50f9d4e34fd28088db8c24348edb1b345d499c05f697d33d87480b9d6ad752c2fd855d05", 0xa5df2e16640d0461, r0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x600701, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)) close(0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffdda, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)}, 0x0) 10:21:32 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x168}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 10:21:32 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000002, 0x0, 0x0, 0x8004, &(0x7f0000002c40)=ANY=[]) 10:21:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x802, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000003c80), 0x38e, 0x62, 0x0) [ 133.554252] audit: type=1804 audit(1568802092.469:40): pid=7412 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir492182000/syzkaller.2Aj2uV/28/bus" dev="sda1" ino=16561 res=1 10:21:32 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000040)={0x0, 0x7, 0x0, [], &(0x7f0000000000)={0x0, 0x0, [], @value64}}) 10:21:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreq(r1, 0x0, 0x17, 0x0, 0x0) 10:21:32 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x168}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/icmp\x00') socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 10:21:32 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000002, 0x0, 0x0, 0x8004, &(0x7f0000002c40)=ANY=[]) 10:21:32 executing program 3: io_setup(0x2c5, &(0x7f0000000180)=0x0) r1 = socket$inet(0x10, 0x2, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000001480)=[&(0x7f0000001280)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000001340)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x3}]) 10:21:32 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000040)={0x0, 0x7, 0x0, [], &(0x7f0000000000)={0x0, 0x0, [], @value64}}) 10:21:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreq(r1, 0x0, 0x17, 0x0, 0x0) 10:21:32 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x168}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/icmp\x00') socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 10:21:32 executing program 4: get_mempolicy(0x0, &(0x7f0000000140), 0x7, &(0x7f0000ffd000/0x3000)=nil, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000180)="7696e8456e38ff5e506c85874877f97a4cf546fedb56b85502a6f89cebe26e42c5d452a88aaf45bed2a7852962c234fb6e53a968be79a5423f0cd3fb675ca891286bd048379ddcdc1871b0ace8410d0267bd4ebc8451fa56fb86e0c4a0e9ac697a6bb56910af76bd15fbbdc5ba07debfa8458a394bb953dda9ffc45ab29e6c3d24d3719c9a7ab735ff1655011c172b5b6bf193d7e3c94c203928bebbf96d7a50f9d4e34fd28088db8c24348edb1b345d499c05f697d33d87480b9d6ad752c2fd855d05", 0xa5df2e16640d0461, r0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x600701, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)) close(0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffdda, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)}, 0x0) 10:21:32 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x168}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/icmp\x00') socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 10:21:32 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000040)={0x0, 0x7, 0x0, [], &(0x7f0000000000)={0x0, 0x0, [], @value64}}) 10:21:32 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000002, 0x0, 0x0, 0x8004, &(0x7f0000002c40)=ANY=[@ANYBLOB]) 10:21:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) socket(0x400000000000010, 0x802, 0x0) setsockopt$inet_mreq(r1, 0x0, 0x17, 0x0, 0x0) 10:21:32 executing program 3: get_mempolicy(0x0, 0x0, 0x7, &(0x7f0000ffd000/0x3000)=nil, 0x0) r0 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$user(0x0, &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000180)="7696e8456e38ff5e506c85874877f97a4cf546fedb56b85502a6f89cebe26e42c5d452a88aaf45bed2a7852962c234fb6e53a968be79a5423f0cd3fb675ca891286bd048379ddcdc1871b0ace8410d0267bd4ebc8451fa56fb86e0c4a0e9ac697a6bb56910af76bd15fbbdc5ba07debfa8458a394bb953dda9ffc45ab29e6c3d24d3719c9a7ab735ff1655011c172b5b6bf193d7e3c94c203928bebbf96d7a50f9d4e34fd28088db8c24348edb1b345d499c05f697d33d87480b9d6ad752c2fd855d05", 0xc3, r0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x600701, 0x0) ioctl$KDSETLED(r1, 0x4b32, 0x8) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)) close(0xffffffffffffffff) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffdda, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) syz_genetlink_get_family_id$team(0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="480100117000070500"/20, @ANYRES32, @ANYBLOB="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"], 0x3}}, 0x0) 10:21:32 executing program 0: ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000040)={0x0, 0x7, 0x0, [], &(0x7f0000000000)={0x0, 0x0, [], @value64}}) 10:21:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) socket(0x400000000000010, 0x802, 0x0) setsockopt$inet_mreq(r1, 0x0, 0x17, 0x0, 0x0) 10:21:32 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x168}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/icmp\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 10:21:33 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000002, 0x0, 0x0, 0x8004, &(0x7f0000002c40)=ANY=[@ANYBLOB]) 10:21:33 executing program 0: ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000040)={0x0, 0x7, 0x0, [], &(0x7f0000000000)={0x0, 0x0, [], @value64}}) 10:21:33 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x168}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/icmp\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 10:21:33 executing program 4: get_mempolicy(0x0, &(0x7f0000000140), 0x7, &(0x7f0000ffd000/0x3000)=nil, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000180)="7696e8456e38ff5e506c85874877f97a4cf546fedb56b85502a6f89cebe26e42c5d452a88aaf45bed2a7852962c234fb6e53a968be79a5423f0cd3fb675ca891286bd048379ddcdc1871b0ace8410d0267bd4ebc8451fa56fb86e0c4a0e9ac697a6bb56910af76bd15fbbdc5ba07debfa8458a394bb953dda9ffc45ab29e6c3d24d3719c9a7ab735ff1655011c172b5b6bf193d7e3c94c203928bebbf96d7a50f9d4e34fd28088db8c24348edb1b345d499c05f697d33d87480b9d6ad752c2fd855d05", 0xa5df2e16640d0461, r0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x600701, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)) close(0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffdda, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)}, 0x0) 10:21:33 executing program 0: ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000040)={0x0, 0x7, 0x0, [], &(0x7f0000000000)={0x0, 0x0, [], @value64}}) 10:21:33 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000002, 0x0, 0x0, 0x8004, &(0x7f0000002c40)=ANY=[@ANYBLOB]) 10:21:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) socket(0x400000000000010, 0x802, 0x0) setsockopt$inet_mreq(r1, 0x0, 0x17, 0x0, 0x0) 10:21:33 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x168}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/icmp\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 10:21:33 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x168}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/icmp\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 10:21:33 executing program 0: r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000040)={0x0, 0x7, 0x0, [], &(0x7f0000000000)={0x0, 0x0, [], @value64}}) 10:21:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreq(r1, 0x0, 0x17, 0x0, 0x0) 10:21:33 executing program 3: get_mempolicy(0x0, 0x0, 0x7, &(0x7f0000ffd000/0x3000)=nil, 0x0) r0 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$user(0x0, &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000180)="7696e8456e38ff5e506c85874877f97a4cf546fedb56b85502a6f89cebe26e42c5d452a88aaf45bed2a7852962c234fb6e53a968be79a5423f0cd3fb675ca891286bd048379ddcdc1871b0ace8410d0267bd4ebc8451fa56fb86e0c4a0e9ac697a6bb56910af76bd15fbbdc5ba07debfa8458a394bb953dda9ffc45ab29e6c3d24d3719c9a7ab735ff1655011c172b5b6bf193d7e3c94c203928bebbf96d7a50f9d4e34fd28088db8c24348edb1b345d499c05f697d33d87480b9d6ad752c2fd855d05", 0xc3, r0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x600701, 0x0) ioctl$KDSETLED(r1, 0x4b32, 0x8) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)) close(0xffffffffffffffff) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffdda, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) syz_genetlink_get_family_id$team(0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="480100117000070500"/20, @ANYRES32, @ANYBLOB="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"], 0x3}}, 0x0) 10:21:33 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000002, 0x0, 0x0, 0x8004, &(0x7f0000002c40)=ANY=[@ANYBLOB='errors=recov']) 10:21:33 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x168}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/icmp\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 10:21:33 executing program 0: r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000040)={0x0, 0x7, 0x0, [], &(0x7f0000000000)={0x0, 0x0, [], @value64}}) 10:21:33 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_LOCK(r3, 0xb) 10:21:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreq(r1, 0x0, 0x17, 0x0, 0x0) 10:21:33 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000002, 0x0, 0x0, 0x8004, &(0x7f0000002c40)=ANY=[@ANYBLOB='errors=recov']) 10:21:33 executing program 0: r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000040)={0x0, 0x7, 0x0, [], &(0x7f0000000000)={0x0, 0x0, [], @value64}}) 10:21:33 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x168}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/icmp\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 10:21:33 executing program 3: get_mempolicy(0x0, 0x0, 0x7, &(0x7f0000ffd000/0x3000)=nil, 0x0) r0 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$user(0x0, &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000180)="7696e8456e38ff5e506c85874877f97a4cf546fedb56b85502a6f89cebe26e42c5d452a88aaf45bed2a7852962c234fb6e53a968be79a5423f0cd3fb675ca891286bd048379ddcdc1871b0ace8410d0267bd4ebc8451fa56fb86e0c4a0e9ac697a6bb56910af76bd15fbbdc5ba07debfa8458a394bb953dda9ffc45ab29e6c3d24d3719c9a7ab735ff1655011c172b5b6bf193d7e3c94c203928bebbf96d7a50f9d4e34fd28088db8c24348edb1b345d499c05f697d33d87480b9d6ad752c2fd855d05", 0xc3, r0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x600701, 0x0) ioctl$KDSETLED(r1, 0x4b32, 0x8) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)) close(0xffffffffffffffff) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffdda, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) syz_genetlink_get_family_id$team(0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="480100117000070500"/20, @ANYRES32, @ANYBLOB="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"], 0x3}}, 0x0) 10:21:33 executing program 0: syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000040)={0x0, 0x7, 0x0, [], &(0x7f0000000000)={0x0, 0x0, [], @value64}}) 10:21:33 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) timerfd_create(0x9, 0x0) 10:21:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreq(r1, 0x0, 0x17, 0x0, 0x0) 10:21:33 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x168}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/icmp\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)) preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 10:21:33 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000002, 0x0, 0x0, 0x8004, &(0x7f0000002c40)=ANY=[@ANYBLOB='errors=recov']) 10:21:33 executing program 4: pipe(&(0x7f0000000040)) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x0) pipe2(&(0x7f0000000080), 0x0) pipe2(&(0x7f0000000080), 0x0) socket$netlink(0x10, 0x3, 0x0) pipe2(&(0x7f0000000080), 0x0) socket$packet(0x11, 0x3, 0x300) socket(0x11, 0x800000003, 0x0) dup(r0) socketpair(0x0, 0x1, 0x0, &(0x7f0000000000)) socketpair(0x2000000000000001, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f0000000340)='lo\x00\x96o\xd6Q\xb1Y\xa9\xc8J,`\xd2\x98\x00\x00\x00 ') 10:21:33 executing program 0: syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000040)={0x0, 0x7, 0x0, [], &(0x7f0000000000)={0x0, 0x0, [], @value64}}) 10:21:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreq(r1, 0x0, 0x17, 0x0, 0x0) 10:21:33 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000002, 0x0, 0x0, 0x8004, &(0x7f0000002c40)=ANY=[@ANYBLOB='errors=recover,nls']) 10:21:33 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x168}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/icmp\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)) preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 10:21:33 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0x1da9, 0x4) sendto$inet(r0, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) 10:21:33 executing program 0: syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000040)={0x0, 0x7, 0x0, [], &(0x7f0000000000)={0x0, 0x0, [], @value64}}) 10:21:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreq(r1, 0x0, 0x17, 0x0, 0x0) 10:21:33 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x168}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/icmp\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)) preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 10:21:33 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000002, 0x0, 0x0, 0x8004, &(0x7f0000002c40)=ANY=[@ANYBLOB='errors=recover,nls']) 10:21:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreq(r1, 0x0, 0x17, 0x0, 0x0) 10:21:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x17, 0x0, 0x0) 10:21:34 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null]}, 0x40) 10:21:34 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, 0x0) 10:21:34 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000002, 0x0, 0x0, 0x8004, &(0x7f0000002c40)=ANY=[@ANYBLOB='errors=recover,nls']) 10:21:34 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x168}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/icmp\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0b") preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 10:21:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x17, 0x0, 0x0) 10:21:34 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0x1da9, 0x4) sendto$inet(r0, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) 10:21:34 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x168}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/icmp\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0b") preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 10:21:34 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000002, 0x0, 0x0, 0x8004, &(0x7f0000002c40)=ANY=[@ANYBLOB='errors=recover,nls=cp']) 10:21:34 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, 0x0) 10:21:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11df79053098cfe47bf070") pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$inet6(0x10, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="5500000052007f5f", 0x8}], 0x1}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x3ded5adb) splice(r1, 0x0, r3, 0x0, 0x20000001100a, 0x0) 10:21:34 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000002, 0x0, 0x0, 0x8004, &(0x7f0000002c40)=ANY=[@ANYBLOB='errors=recover,nls=cp']) 10:21:34 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, 0x0) 10:21:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x17, 0x0, 0x0) 10:21:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca50d5e0bcfe47bf070") r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r2 = socket$unix(0x1, 0x2, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getpeername$llc(r2, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000000c0)=0x10) r3 = accept4(r2, &(0x7f0000001100)=@vsock={0x28, 0x0, 0x0, @host}, &(0x7f0000001180)=0x80, 0x80000) setsockopt$inet6_MCAST_MSFILTER(r3, 0x29, 0x30, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x190) getsockopt$ax25_int(r3, 0x101, 0x5, &(0x7f0000000040), &(0x7f0000000140)=0x4) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000000)={@remote, 0x7f, r5}) 10:21:34 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x168}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/icmp\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0b") preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) [ 135.381401] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7677 comm=syz-executor.4 10:21:34 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000040)={0x0, 0x0, 0x0, [], &(0x7f0000000000)={0x0, 0x0, [], @value64}}) [ 135.467108] bridge0: port 1(bridge_slave_0) entered disabled state [ 135.487969] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7677 comm=syz-executor.4 10:21:34 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x168}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/icmp\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47b") preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 10:21:34 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000040)={0x0, 0x0, 0x0, [], &(0x7f0000000000)={0x0, 0x0, [], @value64}}) 10:21:34 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000002, 0x0, 0x0, 0x8004, &(0x7f0000002c40)=ANY=[@ANYBLOB='errors=recover,nls=cp']) [ 135.518722] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7677 comm=syz-executor.4 10:21:34 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreq(r0, 0x0, 0x17, 0x0, 0x0) [ 135.569249] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7677 comm=syz-executor.4 10:21:34 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x168}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/icmp\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47b") preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) [ 135.627157] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7677 comm=syz-executor.4 [ 135.717486] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7677 comm=syz-executor.4 [ 135.738998] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7677 comm=syz-executor.4 [ 135.756138] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7677 comm=syz-executor.4 [ 135.769345] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7677 comm=syz-executor.4 [ 135.782715] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7677 comm=syz-executor.4 10:21:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@TCA_STAB={0x34, 0x8, [{{0x1c, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}, {0x14, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}]}]}, 0x58}}, 0x0) 10:21:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca50d5e0bcfe47bf070") r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r2 = socket$unix(0x1, 0x2, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getpeername$llc(r2, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000000c0)=0x10) r3 = accept4(r2, &(0x7f0000001100)=@vsock={0x28, 0x0, 0x0, @host}, &(0x7f0000001180)=0x80, 0x80000) setsockopt$inet6_MCAST_MSFILTER(r3, 0x29, 0x30, &(0x7f0000000180)=ANY=[@ANYBLOB="6a070000000000000a004e2100000004ff0200000000000000000000000000010600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fc000000000000000000000000000000000000000000000000020000000a004e23000000a500000000000000000000000000000001910000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e201df1335200000000000000000000ffff000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c4000b13d9632672b34bfa333adba59311bf1ad4667ed22fd97e24172a1a3f8189d2fb30df23c0679bd0248b4bc003d65d410d7d81ba7e3a1b75a8c7c826c6068a3de03759bfe2b2fed9f65ea8118ec20e41b78e376842f7b82ce70875bf0b482d598452227b0db14a5c79009a04a276aa2141bbe3b403bf4189f996e6cbab753e35eeb9cfc4e12fab997f265e0dce6a2c3e179a1349fea32f2d8ee686d0d3c0a056bb36ac210074149e0726802747a1cf1c6d3bbec10a758804e6cc053ad5ceb105c7bd66b01883243238e40b8648b35e06694479569a0a9702618a5a550ad54a2917844257be9972851c88"], 0x190) getsockopt$ax25_int(r3, 0x101, 0x5, &(0x7f0000000040), &(0x7f0000000140)=0x4) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000000)={@remote, 0x7f, r5}) 10:21:35 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000040)={0x0, 0x0, 0x0, [], &(0x7f0000000000)={0x0, 0x0, [], @value64}}) 10:21:35 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreq(r0, 0x0, 0x17, 0x0, 0x0) 10:21:35 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000002, 0x0, 0x0, 0x8004, &(0x7f0000002c40)=ANY=[@ANYBLOB='errors=recover,nls=cp85']) 10:21:35 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x168}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/icmp\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47b") preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 10:21:35 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000040)={0x0, 0x7, 0x0, [], 0x0}) 10:21:35 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x168}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/icmp\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf0") preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 10:21:35 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreq(r0, 0x0, 0x17, 0x0, 0x0) 10:21:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca50d5e0bcfe47bf070") r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r2 = socket$unix(0x1, 0x2, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getpeername$llc(r2, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000000c0)=0x10) r3 = accept4(r2, &(0x7f0000001100)=@vsock={0x28, 0x0, 0x0, @host}, &(0x7f0000001180)=0x80, 0x80000) setsockopt$inet6_MCAST_MSFILTER(r3, 0x29, 0x30, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x190) getsockopt$ax25_int(r3, 0x101, 0x5, &(0x7f0000000040), &(0x7f0000000140)=0x4) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000000)={@remote, 0x7f, r5}) 10:21:35 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r0, &(0x7f0000000640)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) r3 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000b40)=@newqdisc={0x444, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x418, 0x2, [@TCA_CBQ_RTAB={0x404}, @TCA_CBQ_RATE={0x10, 0x5, {0x7, 0x0, 0x0, 0x0, 0x0, 0x8000}}]}}]}, 0x444}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r5, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=@newqdisc={0x48, 0x24, 0x507, 0x0, 0x0, {0x0, r7, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8, 0x1, 'htb\x00'}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18}]}}]}, 0x48}}, 0x0) 10:21:35 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000002, 0x0, 0x0, 0x8004, &(0x7f0000002c40)=ANY=[@ANYBLOB='errors=recover,nls=cp85']) 10:21:35 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000040)={0x0, 0x7, 0x0, [], 0x0}) 10:21:35 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x168}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/icmp\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf0") preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 10:21:35 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreq(r0, 0x0, 0x17, 0x0, 0x0) 10:21:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca50d5e0bcfe47bf070") r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r2 = socket$unix(0x1, 0x2, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getpeername$llc(r2, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000000c0)=0x10) r3 = accept4(r2, &(0x7f0000001100)=@vsock={0x28, 0x0, 0x0, @host}, &(0x7f0000001180)=0x80, 0x80000) setsockopt$inet6_MCAST_MSFILTER(r3, 0x29, 0x30, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x190) getsockopt$ax25_int(r3, 0x101, 0x5, &(0x7f0000000040), &(0x7f0000000140)=0x4) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000000)={@remote, 0x7f, r5}) 10:21:35 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000040)={0x0, 0x7, 0x0, [], 0x0}) 10:21:35 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000002, 0x0, 0x0, 0x8004, &(0x7f0000002c40)=ANY=[@ANYBLOB='errors=recover,nls=cp85']) 10:21:35 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreq(r0, 0x0, 0x17, 0x0, 0x0) 10:21:35 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x168}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/icmp\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf0") preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 10:21:35 executing program 3: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f00000000c0)={0x1}, 0x8) sendmmsg(r0, &(0x7f0000008280)=[{{0x0, 0x0, &(0x7f0000002480)=[{&(0x7f0000000040)="55cc7d4b61d474b364a886df5b9ed8d593c61f15b7d02ac909cd6f991050f38801a97ec7c67b718a995d233d307c78c6afa69cdf8559bddcecbb967c4d5a2833a3dab9916e2251cbbeeb984df91ee8d88cf515a3174911", 0x57}, {&(0x7f0000000100)="cb5044b832d1d24f106a8a8418604a4f3cf555baf99fb400d6ad86b87a07d48d2eb90d832863080ab548b26e85fa83791ee6617aaff9147d52466598f37428f6931989376177a58f975fe29a3bf43b0a12821da4f555cf1db904e1b93a7ed93df3ee2354c0d8350f285764de800b969af950e719d2b39f21069a9c67b41e6011f6965a720aad6c848c6b42a29c708fbb687a986ef3187aa638b534219201c33dc34a01dd51960a01fb8b57dcc7e5495074aa8808dc8369fd3c97962a2d6b06529504d88c67d315e99386369b6066322d5f928280b3bed5c75f391cdc5bf3a622f469d4f9e20c03aa4b452d9357921086f963bb5708e933073bcccc928fd5bf28f3b99e7cb3b2c65cd7086cd9af31b1e8e136637637bc2bf29c68f9e4114c8c0982643e054aeefe0c68bb8121dd1a8a2d36f808cf1090ca6dc534c85839670faefc36758ee297ba9b7d3bfdc0d977f4e4df1fad4aad7c7cc0757306866b1018d3cba63bb5d58494bbc6717683003a6d046f4422176c1bd3c25339b6207c5ff8204ac3ee8d73ed78835b2f2e2ee4eed21e2130d6006127f443263196758df86af96ecca4c44ae1481bfdd74f7c299087cdd9aafcbfa186d236ce6053107ca0eee29f056d6dc66e26c44bce9b670986060552526817e55ade9c3d7ebd6baf76d122b9a989c88b99a1310e25ad13332428b4b19ba0caafecee5d2b7dde58e770292f87543099af5db5b1539da14046f47e46074e5877514779e6728ed896a2b9ff2182f18757ff3966aaba62e36a6faba9af47b2e1b6cbf9949beced143ffec9d621aa83523103b36b84fe34571924f752a7fbf5545e666f8ccf3f94840ea2479fbf3424d7e01c7fcb8c2b00f71ee7b56054c9216034548a846a694d29f18ad5c89cbe7cc74a7b7525880a05a73b1a00d91606ab3d9e86876acbc9c0c722a20de56537ab68377706b68ba309ccd16ac8027c7b8c709a191aff021fde918afa03cd7bbbfdfebc97d796fa8d333fd31c123ae833861e402066902d5fe7354f856a97fc9cacc473c552de6a077f205adc3f313a9d52177ce00540dae742464015f662ebffb378f160baedeae8835aa63e30c19dd9105c0d1d185bf248e9c7ceac4d46144bdfdbc04a66310c6ca82a38fdd5e75eb305723a15d400c5e3d73f3f5d15ce9d191babc3c3cfa3e0e119806cd20e50d08465db5a1a36bba651cac6e6efe3204561997108102dcc63d7ab6d3440543080f6989a0f9c487268f524e5086a74bfe2b90826ab225396ec25ea6f070c1403fe94c74bd7db45e2ebbdd25de1a329aed54c7b3a20354123e706c681a09a96f1c585e5f615b4f4c72cfea99037e2829ccd23b641461eaed5c673966191c468073cbfdd146bd86a9ae9344354bb33143385ab2214922d98e9eb5c8d151a3e5788b92d72ad259bba95049c9df4ae534638a0074116625e28213db136bf70d09dc43b96fc721a7732f0bc4b3b93d6472d1260a3467d237c43dda6c0e451d155b3539866b4f7c01a28036e8b2a14daaecef8a1083dcdfdd4b6060fea91eb736385ca7f39b9e65bb0b12dcf5ebf7268dcfb3dd724b5ff8bb8cfe80e43f20b0ddb6e2a2894ba10c24f89143ef2af4210ee3f75b2717eef994903f22dcbd88f54b4142406949abff2a4b6ef83da3a2a6dd1e336ad82e7f84e8b46cae11f15ec82d8f5", 0x4ae}, {0x0, 0x2}], 0x3}}], 0x1, 0x24000004) 10:21:35 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000040)=0x10000000006) write$UHID_INPUT(r0, &(0x7f00000002c0)={0x8, "b13e1c20d1764d052a4289a71186ca1abfa7f39eb694f4602948f6585c2842ac42cb2f94b098e98f28cd6128dab4a71d544e96e01e3a9a3548ee5f554c06d963346edb9d133e86fdd31c21e9aaffeb52f7cd63297b1fd0db1845e12bda3ce00f0cca0e6ac9c42a61e687c24c0553b408359c86c7bfd7a30944ac327f982b011258e85ee00f050c38e73199d07b72b225a96ab0fb5a9ea944a233e46cd4c25aaa0fe04bd9b3203f61a06c8f094563ffa0078e50248ce1acebc03c75069eb1cb20ebbe30ec063f9ebc45290dc4f8b56ebb08d32e4df04785fd385029f766a0b96db6a1b6615de63393fe97082c076a7170d2b1c06ce0627d6acae850c2b95f38b079a352f27bf6f5460078b8e597c1d3bdb5cf9e73f42eec5aea224ab44b94e18e812864faeaf770ba7471f99b07d41d573d1d4c3833fb4410ea36d710bfa66ccdb14a1927a678f873b023e82c341a43704adb37242a67b2a46d02ab7aee23cf3030a2f3dd58eece667b6e9393ee8d36649e37e83b1c73c0ef65b4df6173c1c25324fbb9afa1361dc4275f152deb03d7138a688eb9dc66e7845ce1be5647bf740b0e1dd038120ef1e3e1cf420cf8b723bef771376e433935e4f9096a10c4a969aceaac4791c41f365b274dab49bddf51b22a24c05ceaedcbf45febc927e98f410d38247d7679cee7b0d3041eaebd7821924ad31e7c5137bf87ce1ec537a981779f0a4c57bbbb5c641cfd02e1e3904f48b0be96fc9851b6bc8c4260168eea9d9d111e2777f78a9021d5eb0166e39410bf279656770263ca2fb7ac0e30d5e168f8cf4bc5665d057da939b770568e41d0fcec5d6aac0bf4ae66fb099b786cdce7f6a9bc00b83d8ed72440a9724d4ef8af71c7efbc31397930cdcb99d30502ecbcc7ddb9161ade16a1badbd7ea3c6c65b387b46234c4660c816506a2f76264bba07ecb685532116bd971464b58e3ea0a29c2fa1d49d9c6308806db01326e9a1b6bbb556f6479b29f48718e211d75f08d0fb477ad8dae5aeaad7e176b2c5ae331ef78212e9dd7e506549dc74ffd940dc91d74aee2fa7f28855919c163f443804e2a072ad8add2be84df87e414afcab0f8e6f67d3ebb1778a6798d50233da09d29b95c0da97304b7a025e50a7c89e614c63bc69477bfe0e5ae2c468332d134f9e22b19eb2f01c8e8d5148b9b980f8b9aa0cab9ba89aafe16d6a8cf9cb5ae659d8fba88e2841f3d6ac0c44dd9f03787d357fe31a4f551e247bfb73b1f2aa1e208c36aa90dcfc4da8877967c05fe951716ec2293d79c6083e79061bbe18150e2af1d889bb4e87c7735b0e7b88a3109a906d1bd4bf9b98c2462420ecc4e9f3a274a6678bc56e9aa7f3d64677141f874f35d00d04a1dc83126ccd69a0221305a3a5418ec24e163b165c1e4533c38f3d213de4012aece68ed11e2f42325d6da5eef78ee985f81a7991e3d1ff69188059c292779579418ef81177fa94b43cdd0fbf92d31f0fb592a864ddc98ddd5b49ece865e7c7a6c873169d0eea46c1a44f645b1cfa40849ffb9f5355ab396dc1a875180f17103be63be4e7d1920949c59ba5d47341c176ac307e165b9733ac5cd9e9691f5ecd76b467881b78f217d50903a06c57270f4104fd26d496dd7e08c27209185761882923f6447c73d53a74e28132e6bf97ee4f2df9d03be88653a9a7251d8df247f1a75f91f95886ce317e3c125aa7686eec86708fa72c9b33a664e76c0ed891ff9d840ac121ae3f96d32330a14fd76df19c7ae0434e2103d6e9175da0b6cc7a007a0a18615271771434959de305636cf7fbfdd16239bff7dbc656a702ebd48f9a2b1937cca80604ec525d292bb7337459235ad047c6933b6c81bd966ea60ec863de568a9e6d8e0378916f441e0f8b2b74df49b9b24094fd643413469428a537aed19b72bf9381ebab4cd57400ecad1cf1b792e9610910d02f9a779b009840e3f1a1395a87f1e590c33018be80a3f34bbaf49e415ba7d3858b40788cd19211b8cad3789870fb252f8991d64bff9558a67a2316ec2402c2f9c52de42e6389fc90bc4379f7b899b1a943035d64f20b7766edf08fdfa185d00493031f0d3f9ad7dce841f725c5adcba896a76857918a2f54c8aa2e50f71eda35b8fea3732a02c146201ad9f4b65b7caa09e2a73f72aee1ce428a35489038d5cc859fbd48be8da5d088ccab897a248fe418b89b409ab5507af725f077d264abec5b53667ca06aed03815dd537535a3360a50ca3d09c025b5057362c7cb5a4b99c58ac64fe813f4d7f2cafbc3048835ec43fa68170ec7310342134c9b5ec417763db145555cdd37f24b27b0911d172710b74d3c754aac02b24030166cbf2eccfaf1e909b629b7919db1351cd0167e8b6bddc5ce4b7e13cbf0c095f636427d440d058e7637eb117947fc6a60942d10bd455030ee38fc447fd3e6232efba65def558dcff60274e6b2ad62464b4f767bcfec22c681c12bdabf1fedc3946f45c9a34a9169f79ea60a9d190dcf1ce14957382af602dd134b610b269247f38c3d4e233f2fda399dc4cf09139cff9e9c731f8bf940df3cbdf9355f604bd0f3d3b20a6cfc39a7d9ff74f734750187b30c1a970a432bf7e9417cc87d8dea00c4e1885845e1a59bc6a5487687c5bca514e9dcf372bcdc0fe4a47f3e4ac456b1a812e69f88b2a8a964d946cc102ba6f3a7c965df24653c6384d810cf157c8581d4b40e874aded8d227a25fab9889f02698bf52980f048408de4a96226949eba5d1b7f41fce61ae1ff9388e096646ddda4c222f7b9bffc1d3e5b645b6e248637698f6a5be1dc03ff7aa9f418153beeef9b9d67ac5b6fc888e5adf0db41a6d5cac2b600af3b428a1294f4fdb4cf64ccc254c1c7ef71b9be3afceb797fc9504bc3f3dde217687d47cd445c44bea2b16eacae76f16d868b77065b189bd7c4678f3a5fc99b4d020d42972d010b7a6b22de46b434f2d8ec4f567af2d531817ec81ffa36cc27d073a66d2152f1be2a8dce08e98a00f473f22e680cf0ebdcf37936cee60f99eec69503a15d8e36f8d599b535021693fb52f9dc93e315d6e849bd4bf9d05fb25f0b09de91b73ca4edfbfa04d9262d449eab2be542ea30f316384609efc52ed641a9e32d48e4a57c65e8bfa5c13e769d5402a0b125c17360800bf0da8592a75abe647f1d9b1072942947da82e701308b60ecdcfd40d7b6cf44b443493ef0466790547c0a8e5914484969e52cba3787c41df965f91ed7074cd62a63db7e1c35b8f9ac30521295ae7b9c81143926f1dd36aefdfbcd7056b0d4209cabe113a18c58ecc062df687666725707029a8be3ef5721484bd429bab33fceb76c6a0f079da8819d0d9565f5e4ed45eb531f9501b85b619b5323169b0297b7cedcf6f288225dd5e6a7f52c1b96cd38dd94b2f6b8cfc6dbd7862901a5295dca5ecbae72344f41c4a222bd6711831d265b910d547501116bcfbf3c9e104b446175c4c8a4e56445ca22f9363f0f54858a8eb4a1c43103bca578c5b0ee372efd705a950510dbbfa4f74c8ddb4bbc1f07dd410ebb39c01f4da8a0bad2d3d35df3a12a9fa2daf44c8163d59aba8a7351ecc9fe4cd25b987dba700e73d7174307161adf70db0e7a802d7c9ec1b912ee58b0a35c2c6f40f112d70ab5aa708071379280c9ffbceaf0a4ec45c89ac0bf3ef40538302b685e24574da8bde8654e99eff66c9ad5e6beafa0e48e1c293c53d955980346cbc052d15e5d1f3baed388dfaa72ca089af06ae757466a704b93a0ff13cb5c722f0b872432a4fd4513ed56825b13ddd4d8c02eb624c8358199f52679421ab0e1792869f6b4aea523a1079b3138f1ef761c6df102096eff43ddb23ee668b9cc5161433feb318903b58387c3dae2833a8c770e7c6e27c31a1fca07377fbb07f11911be6192f7518a8d089b89826e48b28f5c8a00784bef9b2f68c90838eb2c9fcaeda4bb76782510082c977a7ecdd5743e9da8f088a3b67a25cfb25db4a709b6cbf5425e7efa8c2e472464606d9ccd2fc0f73cd1d51a5aa19d9caba10be2147f8e1ad763ba45693f9f078b0716cf588142be847ca67dc132c5782fed12b7d95c55a9bcfdfb85cb48698a45621cc2f1c85559617ece7def71486290b0cf8e987e8788e1a13f17e3f24b93ed2009ebe42e3bea9571f98b39b787c107dcada3a36fa1fe93736e74ec34af80a182cf0adf2846577f1d474c9ff1b4b8a2cfe6a2d445029ca77088b9c84be63655d48cbc5f61b18d7cda0d141f2db6bc3c479aa6ca19638e2c37da38768eb8820e5679345d2abe8033318eb952e297e17dacaaee3df7ef1d6cd554e9b1b453c44e3d4e030e25c5f9ed094100f6d9b1dc5dab371436ab252cc4d7fdf8fe4b7f36ab71f2bbe3878217b151664c3b9ae970e473ae164d77f294ca8ad58634ea446880e8327fc7af2a088e39508443a601eaa00742a7d0ad459dcac24a60edcfa6ac9f72f428c2b8dd30b8278e28f25a1a129d23cacd765de4c4aa52819578951bb8e311e8621f627e3463e2562b6dbc8d1c431c240f1424599438b9c94723f79ffd1fa1bc94104e4598bd43244302f86ddbe47ad8671e25f406aa507ba45bdba09841827a697cece002f79ec7cf14488789d754f84818d180bd04a11cb2115441a402bea2be749ef233bcd26ca27df828ada877a893e54ea3e6ea29e62d6e7693af7cbee59ccdb4045d0e6eeec3d8f59205f324a5f7cf5f871929c83ada04bc5d3990288dca5eb312339933ffb1031e05866e1b2d0aad0ca940795458b7d6c8a3750a76e1e6c8ccd48ca542d6c51164431d70c9d35f0f828cdec404a175a44bc2a9651ec5281c0f3aee9e4375f0eb139f58fa4419fddf9ebe2f8f37121a57397e7e830ac097ed375521a68f7cdc471621b769fef40cd19d8d55a82e27bf5b0cc4182359db7c9066e2ee10df279a89e96fcfea225995f065f7f286b8c8ef9b6c82a34df14dda2f737f557578ce5b15944e3149110102d80465c1b436b6bbb16fdc64a9d130ec7644bc162f0e2c5669a9254970a062561e269d85b72b4748d71d88ca20778287bc3b9613043166862f133f366f6361b9e1d040bbcd9728a70fcf3be7ea8fe0f55980ed03f336ec49f7cb6899813acf47d3b2413e7b637b764fcb9003ece75f8a255b9cdc71f80dbbaa7eaa2111b5551feeb7ea31620a2c88897538915abedcd184d57c79d81505985f561820449c330bc3412bffb68c4c743c5a5a3acafcf00d7561a66f70e5835da530ba62f221211e1fefdc1fbc8c05b1b68b7eb2afac6ebbbc0b961b8ef8b27b555ce7641f6601ac19d5f4adb06b40155a2085ff32de5b2c5edd96a01a14d1bb49b58f1fd718bec428043819b8070e46f0215d2153318320754638d9b40a5214784e7c1f80dde05500cfe8e4dff855504e099634fb3d44829453cf4ac8db7e5a4144f96d4508de90ada04240637fd5b261cfbb80c8d9ccdea6c1d3485a85663cff9749133002c7f9c6ea4de1b50fe90dae397f6b5833e943e6c5f60e10d805e97e6869488b857b44d8c94276f668257c223e2e26dff75222d3f304f8a040ce058e1b7b3bc5f0b69c310beea64212ef0a54bc9fb858c25681cee574c532b64d4f8241e0b855f7f79d0a1ea22fc3d9ad5a1658b5c4d9d417e9eae47c81628341172609a8ef8c72fb6e4e48da6a10207e56b727f65c82d49e2dbb44b492e1265c2b28f98980334ccc3abb0cfd15d73c2f38f4c824022aa7a0ac0b7d35eea934d3455d21e8c710474e54bdf29be107ebc00", 0xa943708f26830065}, 0x1006) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @remote}}}, 0xa0) 10:21:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001540)="11dca50d5e0bcfe47bf070") unshare(0xc000400) r1 = mq_open(&(0x7f0000000380)='-$\x00', 0x6e93ebbbcc0884f7, 0x0, 0x0) lseek(r1, 0x0, 0x3) 10:21:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001540)="11dca50d5e0bcfe47bf070") unshare(0xc000400) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sync_file_range(r1, 0x0, 0x0, 0x0) 10:21:35 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x168}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/icmp\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3a8, 0x0) 10:21:35 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreq(r0, 0x0, 0x17, 0x0, 0x0) 10:21:35 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f00000009c0)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f0000000980)=[{&(0x7f0000000a40)="b2", 0x1}], 0x1, 0x0, 0x0, 0x9000004}, 0x0) 10:21:35 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0xfeb9}], 0x2) 10:21:35 executing program 4: 10:21:35 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x168}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/icmp\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3a8, 0x0) 10:21:35 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreq(r0, 0x0, 0x17, 0x0, 0x0) 10:21:35 executing program 4: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r1, 0x107, 0x12, 0x0, &(0x7f0000000200)) 10:21:35 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x168}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/icmp\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3a8, 0x0) 10:21:36 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000040)=0x10000000006) write$UHID_INPUT(r0, &(0x7f00000002c0)={0x8, "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", 0xa943708f26830065}, 0x1006) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @remote}}}, 0xa0) 10:21:36 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreq(r0, 0x0, 0x17, 0x0, 0x0) 10:21:36 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x168}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/icmp\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") preadv(r0, 0x0, 0x0, 0x0) 10:21:36 executing program 1: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r1, 0x107, 0xe, 0x0, &(0x7f0000000200)) 10:21:36 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000340)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x110, 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000440)=ANY=[], 0x208) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111}}, 0x20) sendfile(r1, r1, 0x0, 0x8080fffffffe) 10:21:36 executing program 3: r0 = creat(0x0, 0x0) fallocate(r0, 0x3, 0x0, 0x8020001) writev(r0, &(0x7f0000000380), 0x0) lseek(r0, 0x400000, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)=""/24, &(0x7f0000000400)=0x18) bind$isdn(0xffffffffffffffff, &(0x7f0000000280), 0x6) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) unshare(0x24020400) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x40521, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) getgid() sendto$inet(r1, 0x0, 0x0, 0x200007fa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4748, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2, 0x1, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) io_getevents(0x0, 0x2c00000000000000, 0x0, &(0x7f0000000400), 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x1) r3 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x3, 0x2) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000480)="dbc80c76070f4c303ede22e2bd8734eb743a8fc4f8fd30398b43d52164487e0c959f07bd9c54daafdc69ecc460ef0ea413474bd11a5a177f8f9bced82f07be2dbb6973822a9e994d89ab034749576e622384e4f591985b356ceee2a5af80c3a741689d712bd86078ec6be4ca74dd0560f7fe292f2a7a8f77a2fe534bd4df07fa86c41ac977748155040ee782e87e515df36dcdf1cfe9cc6e0b98e62a4a74376cd85963d29f") r4 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r8, r7, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x364) epoll_wait(r8, &(0x7f0000000440)=[{}, {}, {}], 0x3, 0x2) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) 10:21:36 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x168}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/icmp\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") preadv(r0, 0x0, 0x0, 0x0) 10:21:36 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreq(r0, 0x0, 0x17, 0x0, 0x0) 10:21:36 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x168}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/icmp\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") preadv(r0, 0x0, 0x0, 0x0) 10:21:36 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x5, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x120) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x52) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 10:21:36 executing program 1: write(0xffffffffffffffff, &(0x7f0000002000)='/', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r0, 0x107, 0x17, 0x0, &(0x7f0000000200)) 10:21:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreq(r1, 0x0, 0x17, 0x0, 0x0) [ 137.731823] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:21:37 executing program 0: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r1, 0x107, 0x11, 0x0, &(0x7f0000000200)) 10:21:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreq(r1, 0x0, 0x17, 0x0, 0x0) 10:21:37 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r1, 0x107, 0x15, 0x0, &(0x7f0000000200)) 10:21:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000eb"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x243, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x40, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pfifo_head_drop={{0x14, 0x1, 'pfifo_head_drop\x00'}, {0x8}}]}, 0x40}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=@newqdisc={0x4c, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@TCA_STAB={0x28, 0x8, [{{0x1c, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}, {0x8, 0x2, [0x0]}}]}]}, 0x4c}}, 0x0) 10:21:37 executing program 3: r0 = creat(0x0, 0x0) fallocate(r0, 0x3, 0x0, 0x8020001) writev(r0, &(0x7f0000000380), 0x0) lseek(r0, 0x400000, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)=""/24, &(0x7f0000000400)=0x18) bind$isdn(0xffffffffffffffff, &(0x7f0000000280), 0x6) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) unshare(0x24020400) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x40521, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) getgid() sendto$inet(r1, 0x0, 0x0, 0x200007fa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4748, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2, 0x1, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) io_getevents(0x0, 0x2c00000000000000, 0x0, &(0x7f0000000400), 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x1) r3 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x3, 0x2) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000480)="dbc80c76070f4c303ede22e2bd8734eb743a8fc4f8fd30398b43d52164487e0c959f07bd9c54daafdc69ecc460ef0ea413474bd11a5a177f8f9bced82f07be2dbb6973822a9e994d89ab034749576e622384e4f591985b356ceee2a5af80c3a741689d712bd86078ec6be4ca74dd0560f7fe292f2a7a8f77a2fe534bd4df07fa86c41ac977748155040ee782e87e515df36dcdf1cfe9cc6e0b98e62a4a74376cd85963d29f") r4 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r8, r7, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x364) epoll_wait(r8, &(0x7f0000000440)=[{}, {}, {}], 0x3, 0x2) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) 10:21:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreq(r1, 0x0, 0x17, 0x0, 0x0) 10:21:37 executing program 1: r0 = socket$inet(0x2, 0x4000020000000001, 0x0) r1 = socket$inet(0x2, 0x4000020000000001, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000800, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) dup3(r0, r1, 0x0) 10:21:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreq(r1, 0x0, 0x17, 0x0, 0x0) 10:21:37 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r1, 0x107, 0x8, 0x0, &(0x7f0000000200)) [ 138.409602] kauditd_printk_skb: 17 callbacks suppressed [ 138.409611] audit: type=1400 audit(1568802097.319:46): avc: denied { map } for pid=7903 comm="syz-executor.0" path="socket:[30205]" dev="sockfs" ino=30205 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=packet_socket permissive=1 [ 138.497667] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:21:37 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x5, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x120) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x52) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 10:21:37 executing program 1: r0 = socket$inet(0x2, 0x4000020000000001, 0x0) r1 = socket$inet(0x2, 0x4000020000000001, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000800, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) dup3(r0, r1, 0x0) 10:21:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreq(r1, 0x0, 0x17, 0x0, 0x0) 10:21:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x4) recvmsg$kcm(r0, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000200)="39000000140081ae0000dc676f97daf01e23578134662c300b2c000500018701546fabca1b4e7d06a6580e88370200c54c1960b89c40ebb373", 0x39}], 0x1}, 0x0) 10:21:37 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000380)='iC;`\xb6p+\x10', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) sendfile(r0, r1, 0x0, 0x2000005) 10:21:37 executing program 3: ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000240)=0x5, 0x4) 10:21:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreq(r1, 0x0, 0x17, 0x0, 0x0) 10:21:37 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000940)={&(0x7f0000000980)=ANY=[], &(0x7f0000000840)=""/200, 0x0, 0xc8, 0x1}, 0x20) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x10000) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\a\xd2\x8f(.\xf6\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+\x8d\xed\xa6\\\x1c\xc3\x97\x94\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\x15v$\xc5\xbcq\x9a\t\x9ej5)\x00\x00\x009\x8c4\xc4\x88C\xa2B\x8b\x81\v\xea\t\xf0\x8fw\a\f\x15\xe2\xd0q\xbb\t\xbf\x85\x98q\v\xd8D\xab9(\xf6.\x15\xcd2-\xf2\xc4\xd8\x00a\xd5\xd9\xb5Z\xd7\xb4\xac\x1d_+k\xd6\x8ag\xdceHE\xd5\x1c\x8a\xbd#\xcc\x82\xca\xc2(\xb6\xe1\x99p\x9b\xa3D\xd2\x91\x96\xef\x05\fv\x16\x14\xcc\xea\x9d\x11w\x1e\xb5VG\x9ad\x9a`=^h\x8c8\xc9\"\x1eO\xb5vk\xc9\xcfi\x90\xd7\xd3H\xa1\xb4\xda\v\x17\x95\xf7\x19\x99\x99\x92\xc3\xc0\x8a\x18\xc7\"g\xd7B\x8f\x85\x18\xf3\x02\xa7\xb6\x83\x92\xefY\xef\x85\x92\x10E\x18\xbc\xacy\xd6\xa7Wh\xcd\xd0\xfa\xcc\xde\xeb\xdf\xad\xfd\xb0\xee\xfb\xc2(\x8cj\xd0uj{4\xb2\xe1p\x88u6\x9a;\xaa\x9f+J\x9e\xe3\xcc\xc7O\xad\x84\x8c;\x92~,\x15\xb2\x97\f~\xa0W\x16\x8b\a\x88\xaa\xe4C\xaf\x90\xdf\x7f\xe51\x00/n\xb5f\x1a\x8c+\xea<\xe3N@\x9e\xec\xbe{\x90x\xc6\x95\xe1I\x1d\xcbY\xe1\x01\xd2d\xae\xd1(>\xa3\xa9\x93\x16\xc6G\x94|\x00\x00\x00\x00\x00\x00\x00\x00', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) gettid() open$dir(0x0, 0x6000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r3, 0x2000000000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 10:21:37 executing program 1: r0 = socket$inet(0x2, 0x4000020000000001, 0x0) r1 = socket$inet(0x2, 0x4000020000000001, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000800, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) dup3(r0, r1, 0x0) 10:21:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreq(r1, 0x0, 0x17, 0x0, 0x0) [ 138.712649] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:21:37 executing program 0: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r1, 0x107, 0x14, 0x0, &(0x7f0000000200)) 10:21:37 executing program 1: r0 = socket$inet(0x2, 0x4000020000000001, 0x0) r1 = socket$inet(0x2, 0x4000020000000001, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000800, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) dup3(r0, r1, 0x0) [ 138.878469] audit: type=1804 audit(1568802097.789:47): pid=7970 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir182252587/syzkaller.b2gBpU/63/bus" dev="sda1" ino=16646 res=1 [ 139.068613] kasan: CONFIG_KASAN_INLINE enabled [ 139.086339] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 139.104795] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 139.111046] Modules linked in: [ 139.114238] CPU: 0 PID: 7955 Comm: syz-executor.4 Not tainted 4.14.144 #0 [ 139.121155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 139.130533] task: ffff88809841e5c0 task.stack: ffff888065500000 [ 139.136597] RIP: 0010:tcp_push+0xe9/0x610 [ 139.140733] RSP: 0018:ffff888065507a48 EFLAGS: 00010202 [ 139.146102] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc9000ba5b000 [ 139.153365] RDX: 0000000000000007 RSI: ffffffff85231b30 RDI: 0000000000000038 [ 139.160628] RBP: ffff888065507a98 R08: ffff88806204f4dc R09: ffff88809841ee60 [ 139.167894] R10: 0000000000000000 R11: 0000000000000000 R12: ffff88806204ec40 [ 139.175155] R13: 0000000000000000 R14: ffff88806204f4d4 R15: 0000000000000000 [ 139.182416] FS: 00007f746d414700(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 139.190633] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 139.197117] CR2: 00000000014c2b40 CR3: 0000000089426000 CR4: 00000000001406f0 [ 139.204384] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 139.211647] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 139.218907] Call Trace: [ 139.221501] tcp_sendmsg_locked+0x2307/0x3200 [ 139.226007] ? tcp_sendpage+0x60/0x60 [ 139.229811] ? trace_hardirqs_on_caller+0x400/0x590 [ 139.234823] ? trace_hardirqs_on+0xd/0x10 [ 139.238966] tcp_sendmsg+0x30/0x50 [ 139.242504] inet_sendmsg+0x122/0x500 [ 139.246314] ? inet_recvmsg+0x500/0x500 [ 139.250280] sock_sendmsg+0xce/0x110 [ 139.253986] SYSC_sendto+0x206/0x310 [ 139.257697] ? SYSC_connect+0x2d0/0x2d0 [ 139.261673] ? kasan_check_read+0x11/0x20 [ 139.265834] ? _copy_to_user+0x87/0xd0 [ 139.269722] ? put_timespec64+0xb4/0x100 [ 139.273781] ? nsecs_to_jiffies+0x30/0x30 [ 139.277924] ? SyS_clock_gettime+0xf8/0x180 [ 139.282242] SyS_sendto+0x40/0x50 [ 139.285688] ? SyS_getpeername+0x30/0x30 [ 139.289747] do_syscall_64+0x1e8/0x640 [ 139.293629] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 139.298471] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 139.303650] RIP: 0033:0x4598e9 [ 139.306836] RSP: 002b:00007f746d413c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 139.314540] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004598e9 [ 139.321809] RDX: 00000000fffffdda RSI: 00000000200000c0 RDI: 0000000000000006 [ 139.329072] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 000000000000001a [ 139.336335] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f746d4146d4 [ 139.343603] R13: 00000000004c7880 R14: 00000000004dd188 R15: 00000000ffffffff [ 139.350871] Code: 00 4d 8d 84 24 9c 08 00 00 4c 89 45 b8 e8 c0 c7 39 fc 48 8d 7b 38 4c 8b 45 b8 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 06 0f 8e 1e 04 00 00 48 b8 00 00 00 00 00 [ 139.370048] RIP: tcp_push+0xe9/0x610 RSP: ffff888065507a48 [ 139.385672] ---[ end trace f56631e09364ed98 ]--- [ 139.391567] kobject: 'loop3' (ffff8880a4ad13a0): kobject_uevent_env [ 139.398017] kobject: 'loop3' (ffff8880a4ad13a0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 139.409512] Kernel panic - not syncing: Fatal exception [ 139.416201] Kernel Offset: disabled [ 139.419862] Rebooting in 86400 seconds..