k_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00'}) 17:43:36 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4000, 0x0) write$P9_RREMOVE(r0, &(0x7f0000000040)={0x7, 0x7b, 0x2}, 0x7) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03L`\x00\x00\x00\x00l\x00'}) socket$inet_sctp(0x2, 0x5, 0x84) 17:43:36 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xb7000040, 0x12], [0xc1]}) 17:43:36 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00', 0x0}) 17:43:36 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:36 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 743.534231][ T5264] device ifb0 entered promiscuous mode [ 743.567225][ T5264] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 743.588516][ T5265] device ifb0 left promiscuous mode [ 743.620939][ T5274] kvm [5254]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:43:36 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:36 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 743.763455][ T5264] device ifb0 entered promiscuous mode 17:43:36 executing program 3: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03L`\x00\x00\x00\x00l\x00'}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x101000, 0x0) r2 = shmget(0x0, 0x1000, 0x200, &(0x7f0000ffd000/0x1000)=nil) shmctl$IPC_STAT(r2, 0x2, &(0x7f0000000100)=""/148) ioctl$DRM_IOCTL_GET_MAGIC(r1, 0x80046402, &(0x7f0000000080)=0x6) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f00000000c0)={0x2, 0xc, 0x6, 0x90000004}, 0x10) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) [ 743.813003][ T5264] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:43:36 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xc0000080, 0x12], [0xc1]}) [ 743.884821][ T5280] device ifb0 left promiscuous mode 17:43:36 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00'}) 17:43:36 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:36 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 744.195936][ T5308] kvm [5295]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 744.234245][ T5300] device ifb0 entered promiscuous mode 17:43:36 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00', 0x0}) 17:43:37 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 744.253282][ T5300] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 744.290519][ T5304] device ifb0 left promiscuous mode 17:43:37 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x500000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:37 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:37 executing program 3: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03L`\x00\x00\x00\x00l\x00'}) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x28000, 0x0) ioctl$VIDIOC_DBG_G_REGISTER(r1, 0xc0385650, &(0x7f0000000040)={{0x2, @addr=0x1}, 0x8, 0x8, 0xeb}) 17:43:37 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xc0000081, 0x12], [0xc1]}) 17:43:37 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00', 0x0}) 17:43:37 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00'}) 17:43:37 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00', 0x0}) 17:43:37 executing program 3: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03L`\x00\x00\x00\x00l\x00'}) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)={0x7fffffff, 0x5, 0x10001, 0x1, 0x1f}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x4000, 0x0) getpeername$netlink(r1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write$USERIO_CMD_SEND_INTERRUPT(r1, &(0x7f0000000100)={0x2, 0x1}, 0x2) [ 744.766656][ T5345] kvm [5335]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:43:37 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x600000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 744.836862][ T5354] device ifb0 entered promiscuous mode 17:43:37 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 744.890521][ T5354] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 745.010534][ T5360] device ifb0 left promiscuous mode 17:43:37 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000280)={r0, &(0x7f0000000180)="349d23564272357c2f94e3b2c865f060bbbbbed54bdd4f3ef75a43cff0b0221ca03efb6aa9b4fd6dc5dc6b6097946cb22a931ef4604f28f75230813306a9e3531a339132a98c0aecd8d572cc8ddbcca55d71ab135a8981c5df4665c3d78f08111029fdee236b613f1eaa8042880ad8f538efaa3c787bfd28228b4ce343a1d0c76fb0978bf2", &(0x7f0000000240)=""/5}, 0x18) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x5, 0xa0200) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000300)='nbd\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@broadcast, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000500)=0xe8) r4 = geteuid() setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000540)={{{@in=@empty, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e23, 0xffffffffffff619d, 0x4e20, 0xbec3, 0xa, 0x20, 0x20, 0xaf, r3, r4}, {0x1, 0x2, 0x7, 0x5, 0x215f, 0x8001, 0xbbc8, 0x4}, {0xd310, 0x7fff, 0x6, 0x6}, 0x4, 0x6e6bbb, 0xe29f9850dd1086b9, 0x1, 0x1}, {{@in6=@mcast2, 0x4d4, 0xff}, 0xa, @in=@local, 0x0, 0x0, 0x1, 0x2, 0x34, 0x100000000, 0x5}}, 0xe8) setsockopt$inet6_buf(r0, 0x29, 0xd3, &(0x7f0000000640)="38b1b1a482760e4ede954bfdbc0198bf88bc9c4e2d200d028fe9743f458227aa52ce794a0b55e3737916f383839ac51dacb333786b380d53d97c6e87a50761383041eab5020490a3db886aba90741681a6b3a35f3e156702e314c5b202194803b18eabe6dc73ca20080ae27d44bd3b83ca08188ea6ab90c8902aad292c250772d34d730954f44fc6c7796e765a0cb2a4", 0x90) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80400400}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x2c, r2, 0x400, 0x70bd2b, 0x25dfdbfb, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x3}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x57}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x1) ioctl$EVIOCGKEY(r1, 0x80404518, &(0x7f0000000040)=""/205) [ 745.059303][ T5366] __ntfs_error: 88 callbacks suppressed [ 745.059314][ T5366] ntfs: (device loop1): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 745.113093][ T5373] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. [ 745.185522][ T5366] ntfs: (device loop1): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 745.218419][ T5366] ntfs: (device loop1): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 17:43:38 executing program 3: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03L`\x00\x00\x00\x00l\x00'}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm_plock\x00', 0x404000, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000000c0)=""/189) r2 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ifreq(r2, 0x89f3, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') recvmmsg(r0, &(0x7f0000003780)=[{{&(0x7f0000000240)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000380)=""/196, 0xc4}, {&(0x7f00000001c0)=""/54, 0x36}, {&(0x7f00000002c0)=""/29, 0x1d}, {&(0x7f0000000480)=""/116, 0x74}, {&(0x7f0000000500)=""/143, 0x8f}, {&(0x7f0000000300)=""/51, 0x33}, {&(0x7f00000005c0)=""/144, 0x90}, {&(0x7f0000000680)=""/18, 0x12}, {&(0x7f00000006c0)=""/178, 0xb2}], 0x9, &(0x7f0000000840)=""/39, 0x27}, 0x7f}, {{&(0x7f0000000880)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f00000009c0)=[{&(0x7f0000000900)=""/163, 0xa3}], 0x1}, 0x1}, {{&(0x7f0000000a00)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000a80)=""/175, 0xaf}, {&(0x7f0000000b40)=""/187, 0xbb}], 0x2, &(0x7f0000000c40)=""/182, 0xb6}, 0x6}, {{0x0, 0x0, &(0x7f0000000dc0)=[{&(0x7f0000000d00)=""/163, 0xa3}], 0x1, &(0x7f0000000e00)=""/63, 0x3f}, 0x1000}, {{&(0x7f0000000e40)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000ec0)=""/66, 0x42}, {&(0x7f0000000f40)=""/7, 0x7}, {&(0x7f0000000f80)=""/53, 0x35}], 0x3, &(0x7f0000001000)=""/225, 0xe1}}, {{0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000001100)=""/63, 0x3f}, {&(0x7f0000001140)=""/74, 0x4a}, {&(0x7f00000011c0)=""/187, 0xbb}, {&(0x7f0000001280)=""/79, 0x4f}, {&(0x7f0000001300)=""/52, 0x34}, {&(0x7f0000001340)=""/163, 0xa3}], 0x6, &(0x7f0000001480)=""/2, 0x2}, 0x1ff}, {{0x0, 0x0, &(0x7f00000036c0)=[{&(0x7f00000014c0)=""/156, 0x9c}, {&(0x7f0000001580)=""/4096, 0x1000}, {&(0x7f0000002580)=""/127, 0x7f}, {&(0x7f0000002600)=""/137, 0x89}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0x5, &(0x7f0000003740)=""/57, 0x39}, 0x558}], 0x7, 0x1, &(0x7f0000003940)) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000003a40)={'vcan0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000003ac0)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@empty}}, &(0x7f0000003bc0)=0xe8) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000004380)={0x0, @remote}, &(0x7f00000043c0)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000044c0)={'yam0\x00', 0x0}) getsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000004500)={@local, @initdev, 0x0}, &(0x7f0000004540)=0xc) accept$packet(r2, &(0x7f0000004640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000004680)=0x14) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000046c0)={'veth1_to_bridge\x00', 0x0}) getpeername$packet(r1, &(0x7f0000004700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000004740)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000004780)={{{@in=@local, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000004880)=0xe8) accept$packet(r2, &(0x7f00000048c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000004900)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000004a00)={'team0\x00', 0x0}) accept4$packet(r2, &(0x7f0000004a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000004a80)=0x14, 0x800) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000004ac0)={{{@in=@initdev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000004bc0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000004c00)={{{@in=@local, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f0000004d00)=0xe8) getpeername$packet(r2, &(0x7f0000005f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000005f80)=0x14) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000008bc0)={{{@in=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000008cc0)=0xe8) getsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000008d80)={@rand_addr, 0x0}, &(0x7f0000008dc0)=0x14) accept$packet(r1, &(0x7f0000008f00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008f40)=0x14) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000008f80)={0x0, @broadcast, @multicast2}, &(0x7f0000008fc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000009000)={{{@in6=@remote, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000009100)=0xe8) accept4$packet(r2, &(0x7f0000009140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000009180)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000009480)={'lo\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000009f00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x889000}, 0xc, &(0x7f0000009ec0)={&(0x7f00000094c0)={0x9f4, r3, 0x200, 0x70bd2b, 0x25dfdbfc, {}, [{{0x8, 0x1, r4}, {0xd8, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x8f52}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0x8000, 0x8000, 0x3f, 0x8}, {0x80, 0xfffffffffffffffe, 0x7, 0x401}, {0x9, 0x1, 0x2, 0x100}, {0xe61, 0x3, 0x0, 0x2}, {0x5ad, 0x9, 0x5, 0x10000}]}}}]}}, {{0x8, 0x1, r6}, {0x2e4, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x800}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x7ff}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x3628000000000}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xff}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r11}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x74, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x44, 0x4, [{0x4, 0x6, 0x9e3, 0x32e}, {0x9, 0x6, 0x1f, 0xb94}, {0x100000001, 0x1, 0x20, 0x6}, {0x7, 0x8000, 0x2, 0x4}, {0x4, 0x8, 0x6, 0x242}, {0x40, 0x8, 0x5, 0x10001}, {0x800, 0x9, 0x472}, {0x9, 0x7, 0x81, 0x9bce}]}}}, {0x7c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x4c, 0x4, [{0x1, 0x200, 0x2, 0x8000}, {0x9fb, 0xc1bc, 0x3, 0x2}, {0x6, 0x79, 0x6, 0x5}, {0x400, 0x1000, 0x1000, 0x7fff}, {0x9, 0x100000001, 0x8, 0x7f}, {0x4, 0x7, 0x9, 0x668}, {0x1000, 0x6a, 0x7ff, 0x5}, {0x7ff, 0x1, 0x200, 0x355}, {0xfffffffffffffffe, 0x3, 0x1ff, 0x6}]}}}]}}, {{0x8, 0x1, r12}, {0x170, 0x2, [{0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0xfffffffffffffff7, 0x0, 0x7, 0x4}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r14}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x1ff}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r15}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x7fffffff}}, {0x8, 0x6, r16}}}]}}, {{0x8, 0x1, r17}, {0x278, 0x2, [{0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x24, 0x4, [{0x196400000000000, 0xe53, 0x1dad}, {0x1, 0xff, 0x5, 0x81}, {0xd2d, 0x0, 0x400, 0x9}, {0x0, 0x2, 0x100000001, 0x3}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x54, 0x4, [{0x7, 0x67, 0x6, 0x4}, {0x8154, 0x9, 0x46a, 0x3}, {0x9, 0xbe, 0x7, 0x401}, {0x7, 0x0, 0x7f, 0x9}, {0x8000, 0xfffffffffffff74e, 0x825, 0x34e00a85}, {0x9, 0x7, 0x4, 0x1}, {0x0, 0x9, 0x6, 0x7f}, {0x100, 0x8, 0x4ea6a04b, 0x3}, {0x0, 0x4, 0x2, 0x1}, {0x80000000, 0x3f, 0x4, 0x4}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r19}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r20}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r21}, {0x214, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xccb}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r22}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r23}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r24}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r25}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r26}}}]}}]}, 0x9f4}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) setsockopt$RDS_RECVERR(r1, 0x114, 0x5, &(0x7f0000000040)=0x1, 0x4) [ 745.250560][ T5373] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. [ 745.273350][ T5366] ntfs: (device loop1): ntfs_fill_super(): Not an NTFS volume. 17:43:38 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:38 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00', 0x0}) 17:43:38 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:38 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xc0000082, 0x12], [0xc1]}) [ 745.415722][ T5354] device ifb0 entered promiscuous mode [ 745.448419][ T5354] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 745.535809][ T5391] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. [ 745.584067][ T5360] device ifb0 left promiscuous mode [ 745.674906][ T5411] kvm [5402]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 745.705333][ T5413] ntfs: (device loop1): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 745.718341][ T5391] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 17:43:38 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 745.751251][ T5413] ntfs: (device loop1): read_ntfs_boot_sector(): Primary boot sector is invalid. 17:43:38 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00'}) 17:43:38 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00', 0x0}) 17:43:38 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x5, 0x0, &(0x7f0000000080)) 17:43:38 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x800000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:38 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xc0000083, 0x12], [0xc1]}) 17:43:38 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00', 0x0}) [ 746.040843][ T5436] device ifb0 entered promiscuous mode [ 746.056256][ T5436] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:43:38 executing program 3: [ 746.085117][ T5436] device ifb0 left promiscuous mode 17:43:38 executing program 3: 17:43:38 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 746.276643][ T5452] kvm [5444]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:43:39 executing program 3: 17:43:39 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00', 0x0}) [ 746.379943][ T5436] device ifb0 entered promiscuous mode 17:43:39 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x900000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 746.460456][ T5436] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 746.541566][ T5469] device ifb0 left promiscuous mode 17:43:39 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00'}) 17:43:39 executing program 3: 17:43:39 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xc0000084, 0x12], [0xc1]}) 17:43:39 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:39 executing program 3: [ 746.724408][ T5487] kvm [5481]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:43:39 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xa00000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:39 executing program 3: 17:43:39 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:39 executing program 3: [ 746.977345][ T5484] device ifb0 entered promiscuous mode [ 746.999882][ T5484] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 747.010597][ T5489] device ifb0 left promiscuous mode 17:43:39 executing program 3: 17:43:39 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00', 0x0}) 17:43:39 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xc0000100, 0x12], [0xc1]}) [ 747.201114][ T5484] device ifb0 entered promiscuous mode [ 747.243060][ T5484] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 747.272823][ T5489] device ifb0 left promiscuous mode [ 747.435021][ T5523] kvm [5519]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:43:40 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00'}) 17:43:40 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:40 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xb00000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:40 executing program 3: 17:43:40 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00', 0x0}) 17:43:40 executing program 3: 17:43:40 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xc0000101, 0x12], [0xc1]}) 17:43:40 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00', 0x0}) [ 747.689241][ T5543] device ifb0 entered promiscuous mode [ 747.703008][ T5543] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 747.712123][ T5543] device ifb0 left promiscuous mode 17:43:40 executing program 3: 17:43:40 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xc00000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:40 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:40 executing program 3: [ 747.879689][ T5557] kvm [5547]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:43:40 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00'}) 17:43:40 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00', 0x0}) 17:43:40 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xd00000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000080)=""/69, 0x45}, {0x0}, {0x0}], 0x3) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00505) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r3, &(0x7f00000005c0)=[{0x0}, {0x0}], 0x2) r4 = dup(r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) shutdown(r4, 0x0) poll(0x0, 0x0, 0x4e) r6 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r6, 0x0, 0x6c9, 0x0, 0x0, 0x800e00465) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r5, 0x0) shutdown(r2, 0x0) 17:43:40 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xc0000102, 0x12], [0xc1]}) 17:43:40 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\xff', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 748.224895][ T5582] device ifb0 entered promiscuous mode [ 748.267125][ T5582] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 748.298774][ T5589] device ifb0 left promiscuous mode [ 748.340278][ T5593] kvm [5586]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:43:41 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xe00000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:41 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:41 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00', 0x0}) [ 748.539225][ T5582] device ifb0 entered promiscuous mode [ 748.579155][ T5593] kvm [5586]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 748.589751][ T5582] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 748.668211][ T5606] device ifb0 left promiscuous mode 17:43:41 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xfffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:41 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:41 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00'}) 17:43:41 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xc0000103, 0x12], [0xc1]}) 17:43:41 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00', 0x0}) 17:43:41 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00', 0x0}) [ 749.079094][ T5640] device ifb0 entered promiscuous mode [ 749.085017][ T5640] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 749.104568][ T5640] device ifb0 left promiscuous mode 17:43:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) poll(&(0x7f00000000c0)=[{}, {r0}, {}, {}], 0x4, 0x51) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x6c9, 0x0, 0x0, 0x800e0057d) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x200) shutdown(r1, 0x0) 17:43:41 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:41 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 749.163005][ T5643] kvm [5638]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 749.282125][ T5640] device ifb0 entered promiscuous mode 17:43:42 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00', 0x0}) [ 749.327459][ T5640] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 749.351252][ T5652] device ifb0 left promiscuous mode 17:43:42 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xc0010000, 0x12], [0xc1]}) 17:43:42 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1100000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:42 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:42 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00'}) 17:43:42 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00', 0x0}) [ 749.623119][ T5672] kvm [5671]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:43:42 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xc0010001, 0x12], [0xc1]}) 17:43:42 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00', 0x0}) [ 749.790107][ T5693] device ifb0 entered promiscuous mode [ 749.801049][ T5693] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:43:42 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1200000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 749.836834][ T5693] device ifb0 left promiscuous mode 17:43:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x100000211, 0x2, 0x0, 0x800e005d2) shutdown(r0, 0x0) 17:43:42 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 750.069657][ T5709] kvm [5701]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 750.111240][ T5708] __ntfs_error: 91 callbacks suppressed [ 750.111249][ T5708] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 17:43:42 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) poll(&(0x7f0000000080), 0x1, 0x4e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x35b1fb9b03bbddb0, 0x0, 0x0, 0x800e006f8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r0, r1) readv(r1, &(0x7f0000000200)=[{&(0x7f0000000080)=""/229, 0xe5}, {0x0}, {0x0, 0x26c}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x3) shutdown(r0, 0x0) [ 750.160823][ T5705] ntfs: (device loop1): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 750.197590][ T5705] ntfs: (device loop1): read_ntfs_boot_sector(): Primary boot sector is invalid. 17:43:43 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00', 0x0}) [ 750.214751][ T5705] ntfs: (device loop1): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 750.231870][ T5705] ntfs: (device loop1): ntfs_fill_super(): Not an NTFS volume. [ 750.241425][ T5708] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. [ 750.254331][ T5693] device ifb0 entered promiscuous mode 17:43:43 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1f00000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:43 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00'}) 17:43:43 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 750.327260][ T5693] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 750.421075][ T5729] device ifb0 left promiscuous mode 17:43:43 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xc0010002, 0x12], [0xc1]}) 17:43:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000002880)=[{&(0x7f0000000100)=""/73, 0x49}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00505) shutdown(r0, 0x0) r2 = dup(r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r2, r3) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) recvfrom$inet(r3, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) shutdown(r2, 0x0) [ 750.563225][ T5742] ntfs: (device loop1): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 750.607034][ T5742] ntfs: (device loop1): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 750.645846][ T5742] ntfs: (device loop1): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 750.668787][ T5742] ntfs: (device loop1): ntfs_fill_super(): Not an NTFS volume. [ 750.686338][ T5751] kvm [5741]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 750.742077][ T5735] device ifb0 entered promiscuous mode [ 750.748811][ T5735] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 750.756666][ T5740] device ifb0 left promiscuous mode 17:43:43 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2000000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:43 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000080)=""/69, 0x45}, {0x0}], 0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00505) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r3, &(0x7f00000005c0)=[{&(0x7f00000003c0)=""/206, 0xce}, {0x0}, {0x0}], 0x3) r4 = dup(r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) shutdown(r4, 0x0) poll(&(0x7f0000000080)=[{}], 0x1, 0x0) ppoll(&(0x7f0000000080), 0x1, 0x0, 0x0, 0x20) shutdown(r5, 0x0) shutdown(r2, 0x0) [ 750.965008][ T5735] device ifb0 entered promiscuous mode [ 750.971768][ T5735] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 750.985134][ T5754] device ifb0 left promiscuous mode [ 751.010739][ T5751] kvm [5741]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:43:43 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2010000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:43 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x0f', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:43 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00'}) 17:43:44 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00', 0x0}) 17:43:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xc0010003, 0x12], [0xc1]}) 17:43:44 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2500000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 751.333597][ T5791] device ifb0 entered promiscuous mode [ 751.370709][ T5791] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 751.391397][ T5798] device ifb0 left promiscuous mode [ 751.467075][ T5807] kvm [5796]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:43:44 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\xe0', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 751.625029][ T5791] device ifb0 entered promiscuous mode [ 751.663758][ T5791] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:43:44 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x260f000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 751.711385][ T5812] device ifb0 left promiscuous mode 17:43:44 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00', 0x0}) 17:43:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xc0010004, 0x12], [0xc1]}) 17:43:44 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00'}) [ 751.940675][ T5826] device ifb0 entered promiscuous mode [ 751.963873][ T5826] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 751.972628][ T5831] device ifb0 left promiscuous mode 17:43:44 executing program 3: 17:43:44 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\xff', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 752.043209][ T5829] kvm [5828]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:43:44 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2a01000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:44 executing program 3: 17:43:44 executing program 3: 17:43:45 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3f00000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:45 executing program 3: 17:43:45 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 752.359202][ T5826] device ifb0 entered promiscuous mode [ 752.364960][ T5826] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:43:45 executing program 3: 17:43:45 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00'}) 17:43:45 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xc0010005, 0x12], [0xc1]}) 17:43:45 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00', 0x0}) 17:43:45 executing program 3: [ 752.604540][ T5877] device ifb0 left promiscuous mode [ 752.676648][ T5878] device ifb0 entered promiscuous mode [ 752.685338][ T5878] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:43:45 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:45 executing program 3: [ 752.751009][ T5879] device ifb0 left promiscuous mode 17:43:45 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:45 executing program 3: [ 752.935653][ T5890] kvm [5884]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:43:45 executing program 3: 17:43:45 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00', 0x0}) [ 753.038041][ T5878] device ifb0 entered promiscuous mode 17:43:45 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x4800000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 753.084494][ T5878] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 753.136616][ T5906] device ifb0 left promiscuous mode 17:43:45 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x4, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:46 executing program 3: 17:43:46 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xc0010006, 0x12], [0xc1]}) 17:43:46 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00'}) 17:43:46 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x4b01000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:46 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00', 0x0}) 17:43:46 executing program 3: [ 753.536732][ T5926] kvm [5925]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:43:46 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 753.596700][ T5933] device ifb0 entered promiscuous mode 17:43:46 executing program 3: [ 753.656835][ T5933] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 753.688754][ T5937] device ifb0 left promiscuous mode 17:43:46 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x4c00000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:46 executing program 3: 17:43:46 executing program 3: 17:43:46 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:46 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5001000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 754.009410][ T5933] device ifb0 entered promiscuous mode [ 754.015192][ T5933] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 754.056055][ T5966] device ifb0 left promiscuous mode 17:43:46 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xc0010007, 0x12], [0xc1]}) [ 754.263475][ T5979] kvm [5975]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:43:47 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00'}) 17:43:47 executing program 3: 17:43:47 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00', 0x0}) 17:43:47 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x7, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:47 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5a02000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 754.348558][ T5983] device ifb0 entered promiscuous mode [ 754.354475][ T5983] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:43:47 executing program 3: [ 754.460564][ T5995] device ifb0 left promiscuous mode 17:43:47 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:47 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xc0010015, 0x12], [0xc1]}) 17:43:47 executing program 3: 17:43:47 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5c00000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:47 executing program 3: [ 754.733577][ T6016] kvm [6009]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:43:47 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x9, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 754.918478][ T5983] device ifb0 entered promiscuous mode [ 754.984897][ T5983] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:43:47 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00'}) 17:43:47 executing program 3: io_submit(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6e7400000100ce156385b1080f5ca66310f90900563039e444cd7a646fca63c33cb775870020002bed000000000000c75e008000000000000000000018030400cc000000ac01000000003f49590000000000fece8580000021f1ffffff9f34096a6a7f8bc9d6db697d2705f9642419515506ed0f365f4bbf007da53e31dbb8b6e6c6e3a731be20553b25c2dd41130b760049608baad68cac676f64ae960f46cacc05d33746c3c7343ecaf20080006d9849de3cbd006814"], 0x1) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000180)={'mangle\x00'}, &(0x7f0000000140)=0x54) 17:43:47 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00', 0x0}) 17:43:47 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6800000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:47 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xc001001b, 0x12], [0xc1]}) [ 755.128994][ T6030] __ntfs_error: 103 callbacks suppressed [ 755.129003][ T6030] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. [ 755.181473][ T6041] device ifb0 left promiscuous mode [ 755.211364][ T6046] ntfs: (device loop1): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. 17:43:48 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xa, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 755.260028][ T6053] kvm [6043]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 755.260129][ T6046] ntfs: (device loop1): read_ntfs_boot_sector(): Primary boot sector is invalid. 17:43:48 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000700)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000002c0)={"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"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0x4400ae8f, &(0x7f0000000040)) [ 755.360564][ T6046] ntfs: (device loop1): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 755.396816][ T6046] ntfs: (device loop1): ntfs_fill_super(): Not an NTFS volume. [ 755.426205][ T6049] device ifb0 entered promiscuous mode [ 755.459740][ T6049] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 755.514274][ T6046] ntfs: (device loop1): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 755.527989][ T6052] device ifb0 left promiscuous mode [ 755.618874][ T6066] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. [ 755.639337][ T6046] ntfs: (device loop1): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 755.666826][ T6046] ntfs: (device loop1): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 755.683805][ T6046] ntfs: (device loop1): ntfs_fill_super(): Not an NTFS volume. 17:43:48 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000700)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0x4400ae8f, &(0x7f0000000040)) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000740)={"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"}) 17:43:48 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00', 0x0}) 17:43:48 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xc001001f, 0x12], [0xc1]}) [ 755.818771][ T6049] device ifb0 entered promiscuous mode 17:43:48 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6c00000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:48 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xb, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 755.865489][ T6049] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:43:48 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00'}) [ 755.956620][ T6082] device ifb0 left promiscuous mode 17:43:48 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000540)='./file0\x00') fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f0000000280)='y\x00', 0x2, 0x1) close(r2) 17:43:49 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendto$packet(0xffffffffffffffff, &(0x7f0000000200)="327a43f4b5c83d59e1e280cb893f171ba06275d3a1b2a01211a0a2826a387237d8d635225ce8c589a9b1f295882d86bdb3eb7e", 0x33, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000140)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 756.245722][ T6093] device ifb0 entered promiscuous mode [ 756.254815][ T6093] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 756.269116][ T6106] kvm [6096]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 756.288831][ T6101] device ifb0 left promiscuous mode 17:43:49 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00', 0x0}) 17:43:49 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xc, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 756.446928][ T6093] device ifb0 entered promiscuous mode [ 756.453707][ T6093] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:43:49 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x7001000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 756.533129][ T6118] device ifb0 left promiscuous mode 17:43:49 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xc0010020, 0x12], [0xc1]}) 17:43:49 executing program 3: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xe00000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:49 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xd, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 756.802812][ T6141] kvm [6133]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:43:49 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00'}) 17:43:49 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x7400000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:49 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00', 0x0}) 17:43:49 executing program 3: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xb00000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 756.982737][ T6151] device ifb0 entered promiscuous mode [ 757.008226][ T6151] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 757.036284][ T6155] device ifb0 left promiscuous mode 17:43:49 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xc0010058, 0x12], [0xc1]}) 17:43:49 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xe, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 757.204527][ T6171] kvm [6164]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:43:49 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x7a00000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:50 executing program 3: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xfc03, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:50 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x10, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:50 executing program 3: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x11, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 757.510738][ T6151] device ifb0 entered promiscuous mode [ 757.522317][ T6151] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 757.536684][ T6165] device ifb0 left promiscuous mode 17:43:50 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x11, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 757.581113][ T6167] kvm [6164]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:43:50 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:50 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00'}) 17:43:50 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x20000000, 0x12], [0xc1]}) 17:43:50 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00', 0x0}) 17:43:50 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xc0010117, 0x12], [0xc1]}) 17:43:50 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x12, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 757.922573][ T6219] device ifb0 entered promiscuous mode [ 757.935339][ T6214] kvm [6213]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 757.952135][ T6219] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 758.004222][ T6224] device ifb0 left promiscuous mode 17:43:50 executing program 3: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00'}) [ 758.101914][ T6231] kvm [6220]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:43:50 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x97ffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 758.253571][ T6237] device ifb0 entered promiscuous mode [ 758.261367][ T6237] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:43:51 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x25, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 758.324674][ T6231] kvm [6220]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 758.352224][ T6240] device ifb0 left promiscuous mode 17:43:51 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00', 0x0}) [ 758.473598][ T6219] device ifb0 entered promiscuous mode [ 758.491636][ T6219] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:43:51 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xebffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 758.515343][ T6224] device ifb0 left promiscuous mode 17:43:51 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x48, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:51 executing program 3 (fault-call:27 fault-nth:0): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) [ 758.670161][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:43:51 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00'}) 17:43:51 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00', 0x0}) 17:43:51 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xc0010140, 0x12], [0xc1]}) [ 758.769086][ T6269] FAULT_INJECTION: forcing a failure. [ 758.769086][ T6269] name failslab, interval 1, probability 0, space 0, times 0 17:43:51 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xf003000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 758.816351][ T6269] CPU: 0 PID: 6269 Comm: syz-executor.3 Not tainted 5.2.0-rc5+ #5 [ 758.824221][ T6269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 758.834278][ T6269] Call Trace: [ 758.837591][ T6269] dump_stack+0x1d8/0x2f8 [ 758.841948][ T6269] should_fail+0x608/0x860 [ 758.846382][ T6269] ? setup_fault_attr+0x2b0/0x2b0 [ 758.851425][ T6269] __should_failslab+0x11a/0x160 [ 758.856389][ T6269] should_failslab+0x9/0x20 [ 758.860905][ T6269] kmem_cache_alloc_node+0x65/0x270 [ 758.866165][ T6269] ? __alloc_skb+0x9f/0x500 [ 758.870675][ T6269] __alloc_skb+0x9f/0x500 [ 758.875070][ T6269] ? ip6_mtu+0x2df/0x380 [ 758.879323][ T6269] sk_stream_alloc_skb+0x419/0xa60 [ 758.884443][ T6269] tcp_sendmsg_locked+0x1005/0x4250 [ 758.889670][ T6269] ? kasan_check_write+0x14/0x20 [ 758.894686][ T6269] ? tcp_free_fastopen_req+0x80/0x80 [ 758.899990][ T6269] ? local_bh_enable+0x9/0x30 [ 758.904667][ T6269] ? trace_hardirqs_on+0x74/0x80 [ 758.909721][ T6269] ? __local_bh_enable_ip+0x13a/0x240 [ 758.915086][ T6269] ? local_bh_enable+0x1f/0x30 [ 758.919947][ T6269] ? lock_sock_nested+0xd6/0x120 [ 758.925055][ T6269] tcp_sendmsg+0x2f/0x50 [ 758.929290][ T6269] inet_sendmsg+0x147/0x310 [ 758.933790][ T6269] ? security_socket_sendmsg+0xa0/0xd0 [ 758.939240][ T6269] ? inet_getname+0x3b0/0x3b0 [ 758.943910][ T6269] __sys_sendto+0x4ad/0x680 [ 758.948409][ T6269] ? __ia32_sys_getpeername+0x90/0x90 [ 758.953801][ T6269] ? __mutex_unlock_slowpath+0x18c/0x630 [ 758.959463][ T6269] ? mutex_unlock+0x10/0x10 [ 758.963990][ T6269] ? __sb_end_write+0xde/0x120 [ 758.968849][ T6269] ? kasan_check_write+0x14/0x20 [ 758.973784][ T6269] ? fput_many+0x47/0x1a0 [ 758.978122][ T6269] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 758.984218][ T6269] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 758.989862][ T6269] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 758.995307][ T6269] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 759.001027][ T6269] __x64_sys_sendto+0xe5/0x100 [ 759.005790][ T6269] do_syscall_64+0xfe/0x140 [ 759.010287][ T6269] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 759.016164][ T6269] RIP: 0033:0x4592c9 [ 759.020083][ T6269] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 759.039710][ T6269] RSP: 002b:00007f69da65dc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 759.048224][ T6269] RAX: ffffffffffffffda RBX: 00007f69da65dc90 RCX: 00000000004592c9 [ 759.056220][ T6269] RDX: 00000000fffffdda RSI: 00000000200000c0 RDI: 0000000000000005 [ 759.064180][ T6269] RBP: 000000000075bfc8 R08: 0000000000000000 R09: ffffffffffffff0f [ 759.072233][ T6269] R10: 0000000000000010 R11: 0000000000000246 R12: 00007f69da65e6d4 [ 759.080204][ T6269] R13: 00000000004c707f R14: 00000000004dc260 R15: 0000000000000006 17:43:51 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x4c, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:51 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00', 0x0}) [ 759.198880][ T6286] device ifb0 entered promiscuous mode [ 759.215702][ T6283] kvm [6277]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 759.261025][ T6286] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:43:52 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xf203000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 759.363574][ T6292] device ifb0 left promiscuous mode 17:43:52 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xc0010141, 0x12], [0xc1]}) 17:43:52 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5c, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) [ 759.621262][ T6316] kvm [6309]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:43:52 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 759.677421][ T6286] device ifb0 entered promiscuous mode [ 759.715392][ T6286] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 759.760580][ T6319] device ifb0 left promiscuous mode [ 759.760617][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:43:52 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x68, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:52 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00'}) 17:43:52 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xf9fdffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:52 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xc0011022, 0x12], [0xc1]}) 17:43:52 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00', 0x0}) 17:43:52 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6c, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 760.138465][ T6339] __ntfs_error: 101 callbacks suppressed [ 760.138475][ T6339] ntfs: (device loop1): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 760.154835][ T6339] ntfs: (device loop1): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 17:43:52 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00', 0x0}) [ 760.205045][ T6339] ntfs: (device loop1): ntfs_fill_super(): Not an NTFS volume. [ 760.213290][ T6346] device ifb0 entered promiscuous mode [ 760.238859][ T6346] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 760.250206][ T6351] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. [ 760.291204][ T6355] device ifb0 left promiscuous mode [ 760.323223][ T6339] ntfs: (device loop1): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 760.323705][ T6349] kvm [6344]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 760.376558][ T6339] ntfs: (device loop1): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 760.436695][ T6351] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. [ 760.500040][ T6339] ntfs: (device loop1): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 17:43:53 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x74, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 760.566429][ T6339] ntfs: (device loop1): ntfs_fill_super(): Not an NTFS volume. 17:43:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0x7ffff000, 0x10, 0x0, 0xffffffffffffff0f) 17:43:53 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00', 0x0}) 17:43:53 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xfa03000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 760.703573][ T6346] device ifb0 entered promiscuous mode [ 760.721383][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 760.724941][ T6346] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:43:53 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xc001102a, 0x12], [0xc1]}) [ 760.752168][ T6372] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. [ 760.819180][ T6355] device ifb0 left promiscuous mode [ 760.939752][ T6387] kvm [6380]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:43:53 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x7a, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:53 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00'}) 17:43:53 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xfb03000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:53 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xe0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:53 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00', 0x0}) [ 761.267975][ T6382] kvm [6380]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:43:54 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xfc01000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 761.334718][ T6406] device ifb0 entered promiscuous mode [ 761.362597][ T6406] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:43:54 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xc001102c, 0x12], [0xc1]}) [ 761.408712][ T6411] device ifb0 left promiscuous mode 17:43:54 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xfc03000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0xa, 0x0, 0xffffffffffffff0f) 17:43:54 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x128, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 761.604202][ T6422] kvm [6418]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 761.712986][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:43:54 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00', 0x0}) [ 761.772147][ T6406] device ifb0 entered promiscuous mode [ 761.786874][ T6406] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 761.803951][ T6411] device ifb0 left promiscuous mode 17:43:54 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x129, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:54 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xfd03000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:54 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00'}) 17:43:54 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00', 0x0}) 17:43:54 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xc1000000, 0x12], [0xc1]}) 17:43:55 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xfdfdffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:55 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x12a, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 762.342081][ T6465] device ifb0 entered promiscuous mode [ 762.388682][ T6465] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 762.397133][ T6466] device ifb0 left promiscuous mode [ 762.435516][ T6472] kvm [6462]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:43:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x14, 0x0, 0xffffffffffffff0f) 17:43:55 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00'}) 17:43:55 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00', 0x0}) 17:43:55 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xfdffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:55 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xc2000000, 0x12], [0xc1]}) [ 762.698263][ T6487] device ifb0 entered promiscuous mode 17:43:55 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x300, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 762.743990][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 762.762103][ T6487] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 762.842232][ T6489] device ifb0 left promiscuous mode 17:43:55 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xfe03000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 762.916188][ T6508] kvm [6502]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:43:55 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x500, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 763.089622][ T6487] device ifb0 entered promiscuous mode [ 763.096195][ T6487] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:43:55 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xce000000, 0x12], [0xc1]}) 17:43:55 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xff03000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 763.164638][ T6497] device ifb0 left promiscuous mode 17:43:55 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00'}) 17:43:56 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='debugfs\x00', 0x100000, &(0x7f0000000140)='j!\x00') ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000040)) [ 763.406454][ T6534] kvm [6529]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 763.409724][ T6526] device ifb0 entered promiscuous mode [ 763.444025][ T6526] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 763.521967][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 763.541311][ T6532] device ifb0 left promiscuous mode 17:43:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x25, 0x0, 0xffffffffffffff0f) 17:43:56 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x600, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:56 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffff7f00000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 763.724967][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:43:56 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 763.825369][ T6526] device ifb0 entered promiscuous mode 17:43:56 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00@\x00'}) 17:43:56 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xd0040000, 0x12], [0xc1]}) [ 763.869995][ T6526] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 763.886975][ T6532] device ifb0 left promiscuous mode 17:43:56 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x700, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 764.043363][ T6573] kvm [6564]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:43:56 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x6, 0x1) setsockopt$inet_int(r1, 0x0, 0x17, &(0x7f0000000040)=0x2, 0x4) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 17:43:56 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffffffffff0f, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:56 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00'}) 17:43:57 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x900, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:57 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xd9010000, 0x12], [0xc1]}) [ 764.349850][ T6592] device ifb0 entered promiscuous mode [ 764.413007][ T6592] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 764.481341][ T6599] device ifb0 left promiscuous mode [ 764.535226][ T6607] kvm [6595]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 764.547356][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:43:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0xe8, 0x0, 0xffffffffffffff0f) 17:43:57 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'bridge_slave_1\x00', 0x4}) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x2, 0x402040) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x34, r2, 0x810, 0x70bd25, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfffffffffffffff7}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8001}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1902}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x400c0) 17:43:57 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 764.665682][ T6592] device ifb0 entered promiscuous mode [ 764.734859][ T6592] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 764.750772][ T6599] device ifb0 left promiscuous mode 17:43:57 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xe0060000, 0x12], [0xc1]}) 17:43:57 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xa00, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 764.815355][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 764.967144][ T6633] kvm [6626]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:43:57 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00'}) 17:43:57 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:57 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ip6gre0\x00', 0x200000000000000}) 17:43:57 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xfc010000, 0x12], [0xc1]}) 17:43:57 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:57 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xb00, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 765.189871][ T6647] device ifb0 entered promiscuous mode [ 765.220920][ T6647] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 765.280636][ T6657] device ifb0 left promiscuous mode 17:43:58 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x4, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 765.421734][ T6663] __ntfs_error: 117 callbacks suppressed [ 765.421744][ T6663] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 765.464831][ T6663] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 765.511429][ T6663] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. [ 765.572174][ T6647] device ifb0 entered promiscuous mode [ 765.596005][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 765.598980][ T6663] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. 17:43:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x2ee0, 0x0, 0xffffffffffffff0f) 17:43:58 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x5, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:58 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xffff8000, 0x12], [0xc1]}) 17:43:58 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x109080, 0x0) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req={0x5, 0x5, 0x9, 0x2}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x10000, 0x182) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000140)={r0}) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x1, 0x0) [ 765.632663][ T6647] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 765.657789][ T6657] device ifb0 left promiscuous mode [ 765.742377][ T6663] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 17:43:58 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 765.826469][ T6663] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. [ 765.842717][ T6688] kvm [6678]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 765.854277][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:43:58 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00'}) 17:43:58 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:58 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xc00, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:58 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000040)={0x80000000, 0x1, 0x0, 0x0, 0xffffffff, 0x81a2, 0x7}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) 17:43:58 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x1c000000000, 0x12], [0xc1]}) 17:43:58 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x8, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 766.108756][ T6704] device ifb0 entered promiscuous mode [ 766.131793][ T6704] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:43:58 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/stat\x00') ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000040)={{0x27ffffc, 0xaec5}, {0x408000003, 0x3fb}, 0x1, 0x1, 0x4}) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) socket$key(0xf, 0x3, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) [ 766.164847][ T6709] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 766.183237][ T6712] device ifb0 left promiscuous mode [ 766.204543][ T6709] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 766.263826][ T6709] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. [ 766.363989][ T6709] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 766.378219][ T6723] kvm [6708]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 766.401024][ T6704] device ifb0 entered promiscuous mode [ 766.417316][ T6704] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 766.452594][ T6712] device ifb0 left promiscuous mode [ 766.654485][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:43:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff02) 17:43:59 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x9, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:59 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x1004000000000, 0x12], [0xc1]}) 17:43:59 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xd00, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:59 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd\x00') ioctl$TIOCSRS485(r1, 0x542f, &(0x7f0000000040)={0x3a78d4c5, 0x7, 0xfffffffffffffff9}) prctl$PR_SET_FP_MODE(0x2d, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) 17:43:59 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00'}) [ 766.812679][ T6749] device ifb0 entered promiscuous mode [ 766.832867][ T6749] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 766.836783][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:43:59 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xa, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 766.877903][ T6754] kvm [6738]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 766.890018][ T6748] device ifb0 left promiscuous mode 17:43:59 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xe00, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:59 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xb, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:59 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xf26, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:43:59 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xc, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:00 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x100c000000000, 0x12], [0xc1]}) [ 767.348354][ T6749] device ifb0 entered promiscuous mode [ 767.366559][ T6749] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 767.409763][ T6755] device ifb0 left promiscuous mode [ 767.594832][ T6791] kvm [6785]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 767.631787][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:00 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff03) 17:44:00 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xd, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:00 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0x5102534c, 0x200000) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000140)={0x3f, 0x10001}) recvmsg(r0, &(0x7f0000001d00)={&(0x7f00000006c0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000001bc0)=[{&(0x7f0000000740)=""/247, 0xf7}, {&(0x7f0000000840)=""/4096, 0x1000}, {&(0x7f0000001840)=""/213, 0xd5}, {&(0x7f0000001940)=""/206, 0xce}, {&(0x7f0000001a40)=""/126, 0x7e}, {&(0x7f0000001ac0)=""/243, 0xf3}], 0x6, &(0x7f0000001c40)=""/138, 0x8a}, 0x40000122) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000100)={0xffffffffffff9794, 0x1}) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000200)={0x3, &(0x7f00000001c0)=[{}, {}, {}]}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001d40)={@mcast1, @loopback, @mcast2, 0x1, 0x9, 0x978, 0x500, 0x1, 0x40000000, r1}) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000001dc0)={0x0, 0x0, 0x8, 0x0, [], [{0x40, 0x200, 0x5, 0x1, 0x80000000, 0x4}, {0x0, 0x4, 0x4, 0x551, 0x3, 0xd9}], [[], [], [], [], [], [], [], []]}) shmget(0x0, 0x3000, 0x400, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000380)=[@in6={0xa, 0x4e23, 0xfffffffffffffffb, @loopback, 0x9}, @in6={0xa, 0x4e22, 0x857af, @empty, 0x8000}, @in={0x2, 0x4e24, @multicast1}, @in6={0xa, 0x4e21, 0x9, @remote, 0x8}, @in6={0xa, 0x4e24, 0xffffffffffffff81, @dev={0xfe, 0x80, [], 0x13}, 0x4}, @in6={0xa, 0x4e20, 0x101, @loopback, 0x52}, @in={0x2, 0x4e23, @local}, @in6={0xa, 0x4e24, 0x81, @rand_addr="97f3c81a8ed1b1255ec86c54f8a32133", 0x8}], 0xc8) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000340)={'\x00\x00\x00\x00\x00\x00\x00\x00\x16\x00', 0x2200}) r3 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x7, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r3, 0xc0a85352, &(0x7f0000000040)={{0xcc9, 0x8}, 'port1\x00', 0x28, 0x0, 0x0, 0x401, 0x2, 0x9, 0xd2bc, 0x0, 0x6, 0x8}) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x3, 0xfffffffffffffffc, 0xfffffffffffffffd}) 17:44:00 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1020, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:00 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00'}) 17:44:00 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x2000000000000, 0x12], [0xc1]}) [ 767.759265][ T6800] device ifb0 entered promiscuous mode [ 767.789121][ T6800] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 767.876789][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:00 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1100, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:00 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xe, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 767.917770][ T6815] device ifb0 left promiscuous mode [ 767.987992][ T6821] kvm [6814]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:44:00 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x10, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:01 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1200, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:01 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x11, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:01 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x410000, 0x0) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f00000000c0)={0xa, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f00000001c0)={0x1, 0x0, &(0x7f0000000100)="bb4e3b59ee578d28a3348cfe697a051d242edc5ab5ddd63014c7196193cda2ba8cd79974b4b43805bf46687e578c", &(0x7f0000000140)="9d33d353c89d2f8c751827b4a19a3bc6d2114c8aac9327465125cc6fb06d133894c97e36337f7f04004b174d9771d004160f1e57b4ea47f1ee62f24b0eaabec532111a061496c404fcebe3119115aa28e1f20eb54882fb1107fb472282259042d1b9c5a459faeb8276a8cb", 0x2e, 0x6b}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'yam0\x00', {0x2, 0x8, @empty}}) [ 768.363317][ T6800] device ifb0 entered promiscuous mode [ 768.432566][ T6800] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 768.480283][ T6815] device ifb0 left promiscuous mode [ 768.667957][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff04) 17:44:01 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x12, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:01 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1f00, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:01 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x1, 0x80) ioctl$EVIOCGABS0(r1, 0x80184540, &(0x7f0000000040)=""/26) 17:44:01 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00'}) 17:44:01 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x4000000000000, 0x12], [0xc1]}) [ 768.873320][ T6865] device ifb0 entered promiscuous mode [ 768.896673][ T6865] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 768.935096][ T6866] device ifb0 left promiscuous mode 17:44:01 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x25, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 768.973536][ T6878] kvm [6862]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 769.003366][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:01 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:01 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x48, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:02 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x4c, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 769.255390][ T6865] device ifb0 entered promiscuous mode [ 769.282225][ T6865] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 769.343214][ T6877] device ifb0 left promiscuous mode 17:44:02 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2010, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:02 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x5c, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 769.776321][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff05) 17:44:02 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x68, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:02 executing program 4: r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x9, 0x202200) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000080)={0x42, 0x8000}) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000001c0)={0x0, 0x38, "fad29f71d54b2bdc1f748d6857c5bd1b6773b989b6252c09424dd8da8f64405588ab2d60c9692fbfe9ebdfe0b569f5d10666ca2ca26a53c7"}, &(0x7f0000000200)=0x40) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000240)=@sack_info={r1, 0x0, 0x2}, &(0x7f0000000280)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lapb0\x00'}) getsockopt(0xffffffffffffffff, 0xc00000000000, 0x7, &(0x7f0000000100)=""/185, &(0x7f00000000c0)=0xb9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0}, &(0x7f0000000300)=0xc) ptrace$getsig(0x4202, r2, 0x200, &(0x7f0000000340)) 17:44:02 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x8000000000000, 0x12], [0xc1]}) 17:44:02 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x2}) 17:44:02 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2500, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 769.880294][ T6929] device ifb0 entered promiscuous mode [ 769.886676][ T6929] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:44:02 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) r1 = socket(0x8, 0x0, 0xffffffffffffffc0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/audio\x00', 0x208000, 0x0) ioctl$KVM_GET_MSRS(r2, 0xc008ae88, &(0x7f0000000400)={0x4, 0x0, [{}, {}, {}, {}]}) r3 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0xffffffff, 0x1) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)={0xffffffffffffffff}, 0x113, 0x3}}, 0x20) accept4$llc(r1, &(0x7f0000000480)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000004c0)=0x10, 0x800) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f0000000380)={0x13, 0x10, 0xfa00, {&(0x7f00000000c0), r4, 0x1}}, 0x18) getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) 17:44:02 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6c, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 769.945809][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 769.969586][ T6936] device ifb0 left promiscuous mode [ 770.009122][ T6940] kvm [6926]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:44:02 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x260f, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:02 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x74, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:03 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7a, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:03 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) [ 770.353534][ T6929] device ifb0 entered promiscuous mode [ 770.365943][ T6929] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 770.445967][ T6936] device ifb0 left promiscuous mode [ 770.744689][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff06) 17:44:03 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2801, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:03 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x12a, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:03 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f0000000100)=0x8) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x4800, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14, 0x80000) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x10) 17:44:03 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x4d564b00000000, 0x12], [0xc1]}) 17:44:03 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x3}) [ 770.925403][ T6993] kvm [6992]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 770.938306][ T6990] device ifb0 entered promiscuous mode [ 770.955733][ T6990] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 770.963462][ T6991] __ntfs_error: 62 callbacks suppressed [ 770.963473][ T6991] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 770.963483][ T6991] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 770.963490][ T6991] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. 17:44:03 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x14b, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:03 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2901, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 771.020462][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:03 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x150, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 771.179514][ T7011] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 771.194442][ T7000] device ifb0 left promiscuous mode [ 771.257890][ T7011] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 17:44:04 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x170, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 771.327982][ T7011] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. [ 771.392261][ T7011] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 771.411904][ T7011] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 771.437490][ T7011] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. 17:44:04 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1fc, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:04 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2a01, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 771.556560][ T6990] device ifb0 entered promiscuous mode [ 771.576640][ T6990] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 771.736636][ T7036] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. 17:44:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff07) 17:44:04 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x25a, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:04 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x4}) 17:44:04 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x80ffff00000000, 0x12], [0xc1]}) 17:44:04 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x100, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f00000000c0)={0x7f, 0xd4a, 0x5, 'queue0\x00', 0x100}) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x111000, 0x0) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000040)) 17:44:04 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3f00, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 771.980430][ T7052] device ifb0 left promiscuous mode 17:44:04 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x300, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 772.033552][ T7061] QAT: Invalid ioctl [ 772.042570][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 772.084762][ T7065] kvm [7050]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:44:04 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3f0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:04 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:05 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3f2, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 772.397794][ T7051] device ifb0 entered promiscuous mode [ 772.427520][ T7051] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:44:05 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3fa, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 772.454788][ T7086] QAT: Invalid ioctl 17:44:05 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x4800, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 772.481531][ T7059] device ifb0 left promiscuous mode [ 772.678175][ T7051] device ifb0 entered promiscuous mode [ 772.684576][ T7051] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 772.693620][ T7059] device ifb0 left promiscuous mode [ 772.819458][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff08) 17:44:05 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3fb, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:05 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x5}) 17:44:05 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xd9b4, 0x1) accept4$alg(r1, 0x0, 0x0, 0x80800) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r1, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4006000}, 0xc, &(0x7f0000000280)={&(0x7f00000000c0)={0x1bc, r2, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x12c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9a}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x180000000000000}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x36a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xe000000000}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffffffff01}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}]}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xafc6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6d8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10001}]}, @TIPC_NLA_SOCK={0x3c, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffffffffffffff7f}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x800}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x10001}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}]}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x1}, 0x20000000) 17:44:05 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x4c00, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:05 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3fc, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:05 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x100000000000000, 0x12], [0xc1]}) [ 773.052142][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:05 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3fd, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 773.195254][ T7119] kvm [7117]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:44:05 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) fcntl$setsig(r0, 0xa, 0x40) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x5, 0x2800) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000040)=0x675, 0x4) [ 773.265602][ T7131] device ifb0 entered promiscuous mode [ 773.296099][ T7131] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:44:06 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5c00, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:06 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3fe, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 773.354484][ T7136] device ifb0 left promiscuous mode [ 773.399366][ T7136] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:44:06 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x10001c000000000, 0x12], [0xc1]}) [ 773.683051][ T7157] kvm [7152]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 773.777602][ T7136] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 773.792266][ T7131] device ifb0 entered promiscuous mode [ 773.810084][ T7131] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 773.818375][ T7144] device ifb0 left promiscuous mode [ 773.853046][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0a) 17:44:06 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x500, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:06 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6800, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:06 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x6}) 17:44:06 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x600, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 774.034392][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:06 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x700, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:06 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6c00, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 774.149553][ T7170] device ifb0 entered promiscuous mode [ 774.156252][ T7170] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:44:06 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x10040) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x5) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) 17:44:06 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x101004000000000, 0x12], [0xc1]}) [ 774.249104][ T7180] device ifb0 left promiscuous mode 17:44:07 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x900, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:07 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x7400, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 774.425094][ T7206] kvm [7199]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:44:07 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xa00, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 774.632811][ T7170] device ifb0 entered promiscuous mode [ 774.659686][ T7170] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 774.688506][ T7180] device ifb0 left promiscuous mode [ 774.833293][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0e) 17:44:07 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xb00, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:07 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000000c0)=@ccm_128={{0x304}, "be0941d6c6d611a0", "e9f7cd435c8e8adf6ba3f2dfa12b9d10", "ca161a85", "987e31a7ca33e94a"}, 0x28) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000040)={@initdev}, &(0x7f0000000080)=0xc) r1 = syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0x8, 0x0) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000380)=""/4096) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1a0e, 0x109040) accept$unix(r2, &(0x7f0000000100), &(0x7f0000000180)=0x6e) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000001c0)={0x0, @aes256, 0x0, "66fd7981c26fcc6c"}) [ 774.992736][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:07 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x7}) 17:44:07 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x7a00, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:07 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x10100c000000000, 0x12], [0xc1]}) 17:44:07 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x40, 0x0) connect$tipc(r1, &(0x7f0000000040)=@id={0x1e, 0x3, 0x2, {0x4e23}}, 0x10) 17:44:07 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xc00, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:07 executing program 4: r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@hci, &(0x7f0000000080)=0x80, 0x80000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, r1, 0x820, 0x70bd25, 0x25dfdbff, {{}, 0x0, 0x4107, 0x0, {0x14, 0x18, {0xfffffffffffffff8, @bearer=@l2={'ib', 0x3a, 'veth1\x00'}}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x24008805}, 0x6af0dccf77009dc0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) io_uring_setup(0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200d00}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x30, r1, 0x4, 0x70bd2a, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0xffffffff00000000, 0x9, 0x1f}}}, ["", "", "", "", ""]}, 0x30}}, 0x40001) [ 775.174230][ T7253] device ifb0 entered promiscuous mode [ 775.203989][ T7248] kvm [7240]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:44:08 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xd00, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 775.246227][ T7253] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 775.256531][ T7258] device ifb0 left promiscuous mode 17:44:08 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xe0ff, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 775.362609][ T7258] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:44:08 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x14d564b00000000, 0x12], [0xc1]}) [ 775.585854][ T7278] kvm [7273]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 775.678118][ T7253] device ifb0 entered promiscuous mode [ 775.684103][ T7253] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 775.708277][ T7258] device ifb0 left promiscuous mode [ 775.717157][ T7258] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 775.803174][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r3, 0x100000000, 0x0, 0x0, 0x0, @ib={0x1b, 0x2, 0x7, {"85cd9e3d48d22795f8c43d59e3926540"}, 0x37e, 0x5, 0x6}, @in={0x2, 0x4e20, @multicast1}}}, 0x118) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:44:08 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xedc0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:08 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xe00, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:08 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x8}) 17:44:08 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xf26, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 775.991632][ T7298] __ntfs_error: 62 callbacks suppressed [ 775.991643][ T7298] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 776.005909][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 776.050020][ T7293] device ifb0 entered promiscuous mode [ 776.065842][ T7298] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 776.078072][ T7293] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:44:08 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x200000000000000, 0x12], [0xc1]}) 17:44:08 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) splice(r0, &(0x7f0000000000), r0, &(0x7f0000000040), 0x968, 0xa) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) [ 776.095715][ T7298] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. [ 776.130108][ T7300] device ifb0 left promiscuous mode 17:44:09 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1020, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 776.236930][ T7298] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 776.262083][ T7317] kvm [7308]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 776.314262][ T7298] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 17:44:09 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1100, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 776.385115][ T7298] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. 17:44:09 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffe0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:09 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) socket$kcm(0x29, 0x7, 0x0) 17:44:09 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1200, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 776.540184][ T7293] device ifb0 entered promiscuous mode [ 776.556467][ T7293] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 776.623344][ T7300] device ifb0 left promiscuous mode [ 776.693864][ T7335] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 776.738448][ T7335] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 776.793682][ T7335] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. [ 776.809186][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:09 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x20001c000000000, 0x12], [0xc1]}) 17:44:09 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1f00, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2000000000000000) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) [ 776.886458][ T7335] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. 17:44:09 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x9}) 17:44:09 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:09 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x2000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:09 executing program 4: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) r0 = accept(0xffffffffffffffff, &(0x7f0000000000)=@nl=@proc, &(0x7f0000000080)=0x80) ioctl$SIOCRSSL2CALL(r0, 0x89e2, &(0x7f00000000c0)=@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}) [ 777.056844][ T7349] kvm [7348]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 777.190620][ T7366] device ifb0 entered promiscuous mode [ 777.206112][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 777.220964][ T7366] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:44:09 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x2010, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 777.255777][ T7374] device ifb0 left promiscuous mode [ 777.265288][ T7374] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:44:10 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x80, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r1, 0x28, 0x6, &(0x7f0000000080)={r2, r3/1000+10000}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) 17:44:10 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0xa}) 17:44:10 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:10 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x201004000000000, 0x12], [0xc1]}) 17:44:10 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x2500, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 777.504843][ T7391] device ifb0 entered promiscuous mode [ 777.534771][ T7391] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 777.565299][ T7387] device ifb0 left promiscuous mode [ 777.633812][ T7398] kvm [7390]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:44:10 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 777.842724][ T7391] device ifb0 entered promiscuous mode [ 777.853325][ T7391] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 777.901867][ T7393] device ifb0 left promiscuous mode [ 777.916043][ T7398] kvm [7390]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:44:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r2 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x800) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f00000002c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="2b00000059089dc216efb32926ea9a8859d79a881d09fdd5c56ca71af83777db2b31f1b40b0f12c009036797444659ba8d44407024de0c7947534b71f7332851d065477ef7784b27c8bbab0010f70f0c6dd5fdc80c2a5891436081ed44954389c5eed0ede216e234aa9af8f08a3fca29fb41891bf38c047580e9b8b1fdcef80676ffeef1452fb224addfca70adc03e0aad49cf9129f8397cba8570315dc96fffeedfbd254bb3c95278c228ca875194a727492b"], &(0x7f00000000c0)=0x33) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000200)={r3, @in={{0x2, 0x4e23}}}, 0x84) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000040)) shutdown(r1, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:44:10 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x260f, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:10 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:10 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000001700)={r0}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001780)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001980)={&(0x7f0000001740)={0x10, 0x0, 0x0, 0x100290}, 0xc, &(0x7f0000001940)={&(0x7f00000017c0)={0x160, r2, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x48, 0x5, [@TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000001}]}]}, @TIPC_NLA_MEDIA={0x7c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6c}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}]}, @TIPC_NLA_LINK={0x88, 0x4, [@TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xbc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x87}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}]}, 0x160}, 0x1, 0x0, 0x0, 0x4000001}, 0x8000) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'veth1\x00'}) 17:44:10 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x20100c000000000, 0x12], [0xc1]}) 17:44:10 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x2a01, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:10 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0xb}) 17:44:10 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f0000000040)=0x7) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'ifb0\x80\x03\x00`\\\x00\x00\x00l\x00', 0x2}) fcntl$dupfd(r0, 0x406, r0) [ 778.164040][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:11 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x4000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 778.322943][ T7432] kvm [7430]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 778.360754][ T7442] device ifb0 entered promiscuous mode 17:44:11 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3f00, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 778.430402][ T7442] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 778.476930][ T7448] device ifb0 left promiscuous mode [ 778.538505][ T7448] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:44:11 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 778.598546][ T7442] device ifb0 entered promiscuous mode 17:44:11 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x24d564b00000000, 0x12], [0xc1]}) [ 778.678479][ T7442] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 778.796525][ T7470] kvm [7466]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:44:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r2 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) rt_sigsuspend(&(0x7f0000000000)={0x9a}, 0x8) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(r2, 0x0, 0xffffffffffffffba) recvmsg(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr\x00') ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f00000000c0)={0x5, &(0x7f0000000080)=[{}, {}, {}, {}, {}]}) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:44:11 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x4000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:11 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000000)='bond0\x00'}, 0x30) sync_file_range(r0, 0x1ff, 0x1000, 0x1) fcntl$setown(r0, 0x8, r1) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bond0\x00', 0x4}) 17:44:11 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0xc}) 17:44:11 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:11 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x300000000000000, 0x12], [0xc1]}) [ 779.112576][ T7494] device ifb0 left promiscuous mode 17:44:11 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x4800, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:11 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) [ 779.177400][ T7502] kvm [7488]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 779.206787][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:12 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x7000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:12 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x4b01, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:12 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x4c00, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 779.473716][ T7494] device ifb0 entered promiscuous mode 17:44:12 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x40, 0x0) sendmsg$nl_crypto(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="00001500000127bd7b00ffdbdf256d6f7275733634300000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000891c0bf0336fe68fa9cb0283730de7000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ecff00"/222], 0xe0}, 0x1, 0x0, 0x0, 0x1}, 0x8000) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000240)={0x11c, @tick=0x3, 0x6, {0xe51b, 0x100}, 0x0, 0x3, 0x2}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/attr/current\x00', 0x2, 0x0) [ 779.519678][ T7494] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 779.648598][ T7531] device ifb0 left promiscuous mode [ 779.992938][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r2 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) sendto$x25(r2, &(0x7f0000000000)="0ee6686ffaa6b591ccb68274da8e0551c52ad0f2db652d29583a9070b9df4b3a5cf2fc07097b77facf5fff834ba842575c7f7b3f5315e9a3efd7e6023a4b65ab8f59cbc7b9ac1bbe776bfef213c9c046053791d3ed1c72af655babfe426515877359c2226b50ac3b4106133c4d86f2933ba4dacd5fe5e508b9e90b28b85c233ee45401558dbb02", 0x87, 0x4008000, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:44:12 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x8000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:12 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x30001c000000000, 0x12], [0xc1]}) 17:44:12 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0xd}) 17:44:12 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x5001, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:12 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r1, 0x28, 0x6, &(0x7f0000000080)={r2, r3/1000+30000}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x300001}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r4, 0x400, 0x70bd29, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x4000010}, 0x40) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) 17:44:12 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x5a02, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 780.210214][ T7573] device ifb0 entered promiscuous mode [ 780.217937][ T7573] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 780.232007][ T7563] device ifb0 left promiscuous mode [ 780.281002][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 780.293373][ T7576] kvm [7565]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:44:13 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x9000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:13 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x5c00, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 780.487997][ T7573] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:44:13 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1, 0x80) ioctl$VIDIOC_S_EDID(r0, 0xc0285629, &(0x7f0000000080)={0x0, 0x7fffffff, 0x3, [], &(0x7f0000000040)=0x95}) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) 17:44:13 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0xe}) 17:44:13 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xa000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 780.884065][ T7606] device ifb0 entered promiscuous mode [ 780.890120][ T7606] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 780.897934][ T7610] device ifb0 left promiscuous mode [ 781.066285][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 781.082506][ T7606] device ifb0 entered promiscuous mode [ 781.093553][ T7606] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 781.105086][ T7610] device ifb0 left promiscuous mode 17:44:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x200, 0x0) write$FUSE_WRITE(r2, &(0x7f0000000040)={0x18, 0x0, 0x3, {0x1}}, 0x18) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x12800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:44:13 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x301004000000000, 0x12], [0xc1]}) 17:44:13 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6800, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:13 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xb000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:13 executing program 4: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x9) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x100, 0x0) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000040)) [ 781.277846][ T7629] __ntfs_error: 62 callbacks suppressed [ 781.277855][ T7629] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. 17:44:14 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6c00, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:14 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000040)=0x1000, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000080)='vxcan1\x00') [ 781.340796][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 781.356507][ T7629] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 781.379738][ T7640] kvm [7627]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 781.457996][ T7629] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. 17:44:14 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7001, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:14 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x10}) 17:44:14 executing program 4: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) [ 781.596286][ T7629] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 781.667964][ T7629] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 781.741412][ T7629] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. [ 781.759465][ T7660] device ifb0 entered promiscuous mode 17:44:14 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7400, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:14 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xc000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 781.798060][ T7660] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 781.852495][ T7667] device ifb0 left promiscuous mode [ 782.007147][ T7677] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 782.067464][ T7677] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 782.112062][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 782.117886][ T7677] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. 17:44:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r2 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$IMGETDEVINFO(r2, 0x80044944, &(0x7f0000000200)={0x2}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) preadv(r0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/187, 0xbb}, {&(0x7f00000000c0)=""/46, 0x2e}], 0x2, 0x0) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:44:14 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x30100c000000000, 0x12], [0xc1]}) 17:44:14 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) 17:44:14 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7a00, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:14 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xd000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:15 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xedc0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 782.269063][ T7660] device ifb0 entered promiscuous mode [ 782.309161][ T7660] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 782.333928][ T7690] device ifb0 left promiscuous mode [ 782.352743][ T7695] kvm [7684]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 782.392563][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:15 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xf003, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 782.508406][ T7703] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. 17:44:15 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xe000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:15 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x11}) 17:44:15 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xf203, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:15 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) 17:44:15 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x34d564b00000000, 0x12], [0xc1]}) [ 782.919932][ T7723] device ifb0 entered promiscuous mode [ 782.967982][ T7723] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 782.993289][ T7731] device ifb0 left promiscuous mode [ 783.049413][ T7731] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 783.074109][ T7735] kvm [7725]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:44:16 executing program 3: bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0x29, 0x80000000000000, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, 0x0, 0xffffffffffffff84) r3 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(r2, 0x11, 0x6f, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r4, 0x40045731, &(0x7f0000000080)=0x7fffffff) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000000), 0x4) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r0, 0x1) r5 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:44:16 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfa03, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:16 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x10000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:16 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfb03, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 783.343996][ T7723] device ifb0 entered promiscuous mode [ 783.368490][ T7723] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 783.398740][ T7731] device ifb0 left promiscuous mode [ 783.407200][ T7735] kvm [7725]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 783.438852][ T7731] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:44:16 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x12}) 17:44:16 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x11000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0x20802, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0x7fffffff, 0x1) sendmsg$TIPC_NL_MON_PEER_GET(r2, 0x0, 0x800) r3 = socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x4000, 0x88) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000040)={0x0, 0xfffe00000000000}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r4, 0x84, 0x7c, &(0x7f00000000c0)={r5, 0x8, 0x5}, &(0x7f0000000180)=0x8) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r4, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(r4, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r6 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:44:16 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x400000000000000, 0x12], [0xc1]}) 17:44:16 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfc01, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 783.716303][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:16 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfc03, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 783.796005][ T7779] kvm [7766]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:44:16 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = syz_open_dev$adsp(&(0x7f00000003c0)='/dev/adsp#\x00', 0x1000, 0x400000) r2 = accept4$inet(r1, &(0x7f0000000400)={0x2, 0x0, @remote}, &(0x7f0000000440)=0x10, 0x800) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) dup2(r0, r0) getsockopt$inet_mreqsrc(r1, 0x0, 0x0, &(0x7f0000000000)={@remote, @remote, @loopback}, &(0x7f0000000040)=0xc) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) 17:44:16 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x12000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 783.871120][ T7765] device ifb0 entered promiscuous mode [ 783.877304][ T7765] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:44:16 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfd03, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 783.935126][ T7777] device ifb0 left promiscuous mode 17:44:16 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfe03, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:16 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1f000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:16 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xff03, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 784.304336][ T7765] device ifb0 entered promiscuous mode [ 784.364441][ T7765] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 784.398793][ T7777] device ifb0 left promiscuous mode [ 784.519214][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:17 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x25}) 17:44:17 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000100)=0x14) getpeername$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000300)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000480)={'rose0\x00', r2}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@empty, @in6=@ipv4={[], [], @initdev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f00000002c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000380)={{{@in=@multicast1, @in=@dev={0xac, 0x14, 0x14, 0x15}, 0x4e21, 0x0, 0x4e21, 0x0, 0xa, 0x20, 0x80, 0x3f, r3, r4}, {0x80000001, 0xfb, 0x401, 0x12, 0x0, 0x40, 0x1000, 0x400}, {0x3ff, 0x9, 0x9, 0x4}, 0x100000001, 0x0, 0x1, 0x0, 0x2}, {{@in6=@mcast1, 0x4d4, 0x3c}, 0x2, @in6=@dev={0xfe, 0x80, [], 0x1f}, 0x3506, 0x0, 0x3, 0x0, 0x9, 0x1, 0xfffffffffffffff9}}, 0xe8) fsconfig$FSCONFIG_SET_FD(r1, 0x5, 0xfffffffffffffffe, 0x0, r1) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) socket$isdn(0x22, 0x3, 0x0) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) 17:44:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) r2 = socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(r2, 0x0, 0x20) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:44:17 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x20000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:17 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x40001c000000000, 0x12], [0xc1]}) 17:44:17 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x40000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:17 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x80000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 784.735067][ T7829] kvm [7822]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 784.746891][ T7834] device ifb0 entered promiscuous mode 17:44:17 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f00000000c0)=0x9, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) r1 = socket(0x5, 0x800, 0x9) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="45031595339c90c895e2d2236bf677dfb72bb7b89ab9eb32f70d4d05edf5cd1d9306d2ccb0f0b7a62c7804ce9544faa8dbc0325e8207b29a8fc22a091b094bc5", @ANYRES16=r2, @ANYBLOB="040028bd70002a00df250d000000bb4801000c0007043200000008000000080004004e2200000c005b000c000000020e5300a3dcc5cc656eef7cdd70a6e7acb2814f40d5b65108b5bf2bbf919a5e68bf0fc4392eb465277aa6710f59b53b90"], 0x38}}, 0x8004) [ 784.803179][ T7834] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 784.816338][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:17 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x20100000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 784.867076][ T7835] device ifb0 left promiscuous mode 17:44:17 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x82000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 784.947591][ T7835] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:44:17 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x401004000000000, 0x12], [0xc1]}) 17:44:17 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x25000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 785.226298][ T7863] kvm [7856]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 785.293074][ T7834] device ifb0 entered promiscuous mode [ 785.306931][ T7834] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 785.330140][ T7835] device ifb0 left promiscuous mode [ 785.339748][ T7835] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:44:18 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x48}) 17:44:18 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x200800, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 785.531808][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r2 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(r2, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:44:18 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x260f0000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:18 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:18 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'veth0_to_hsr\x00'}) 17:44:18 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x2000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 785.655737][ T7882] device ifb0 entered promiscuous mode [ 785.694830][ T7882] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:44:18 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x44d564b00000000, 0x12], [0xc1]}) [ 785.754926][ T7885] device ifb0 left promiscuous mode 17:44:18 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x28010000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 785.836234][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:18 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 785.938525][ T7910] kvm [7900]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:44:18 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x29010000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:18 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x4000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 786.322440][ T7882] device ifb0 entered promiscuous mode [ 786.356196][ T7910] kvm [7900]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 786.376685][ T7882] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 786.424677][ T7885] device ifb0 left promiscuous mode 17:44:19 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x4c}) 17:44:19 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2a010000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 786.594210][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 786.681353][ T7946] device ifb0 entered promiscuous mode [ 786.698586][ T7942] __ntfs_error: 62 callbacks suppressed [ 786.698597][ T7942] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. 17:44:19 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x5000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:19 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x500000000000000, 0x12], [0xc1]}) 17:44:19 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_1\x00', 0xc01}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) 17:44:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0xf, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) [ 786.730671][ T7946] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 786.752935][ T7942] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 786.766130][ T7948] device ifb0 left promiscuous mode [ 786.798467][ T7942] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. 17:44:19 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 786.873514][ T7959] kvm [7951]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:44:19 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 786.924495][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 786.956222][ T7942] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 786.995647][ T7942] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 787.017808][ T7942] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. 17:44:19 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:19 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x8000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 787.206807][ T7946] device ifb0 entered promiscuous mode [ 787.260315][ T7946] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 787.291311][ T7978] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. 17:44:20 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x50001c000000000, 0x12], [0xc1]}) 17:44:20 executing program 4: time(&(0x7f0000000000)) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) [ 787.300819][ T7978] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 787.358267][ T7978] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. 17:44:20 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x5c}) 17:44:20 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x9000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 787.445523][ T7988] device ifb0 left promiscuous mode [ 787.467420][ T7978] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. 17:44:20 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x40000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:20 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xa000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 787.568947][ T8000] kvm [7990]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:44:20 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x101000, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0xa0, r2, 0x100, 0x70bd2a, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7f}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x10000}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@rand_addr="73944a6c0703ea56108967e9dbc2cbba"}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x100000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40}, @IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@remote}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1f}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast2}]}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffffffff0000}]}, 0xa0}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) [ 787.709257][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 787.712887][ T7999] device ifb0 entered promiscuous mode [ 787.728408][ T7999] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 787.749246][ T8001] device ifb0 left promiscuous mode 17:44:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_dev$audion(&(0x7f0000001700)='/dev/audio#\x00', 0x2, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(r2, 0x0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x200800, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:44:20 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xb000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:20 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x48000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:20 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xc000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 787.942500][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:20 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x501004000000000, 0x12], [0xc1]}) [ 788.061512][ T7999] device ifb0 entered promiscuous mode 17:44:20 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xd000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:20 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000380)=""/4096, &(0x7f0000000000)=0x1000) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00', 0x200}) [ 788.107885][ T7999] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 788.157882][ T8001] device ifb0 left promiscuous mode [ 788.277567][ T8048] kvm [8040]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:44:21 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x60}) 17:44:21 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x4c000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:21 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xe000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:21 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r1, 0x810c5701, &(0x7f0000000040)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) 17:44:21 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x10000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 788.565429][ T8063] device ifb0 entered promiscuous mode [ 788.616918][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 788.650394][ T8066] device ifb0 left promiscuous mode [ 788.722987][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r2 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) syz_open_dev$midi(&(0x7f0000000380)='/dev/midi#\x00', 0x3ff, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) sendmsg$sock(r2, &(0x7f0000000180)={&(0x7f0000000000)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000080)="68b17437c134717f6383e52ce35dfe198de2a0f209c3acf3bbd5f2fc54416a9b8f43c5429f8c655007351d482a74e8", 0x2f}, {&(0x7f0000000200)="3914239e7a5fb371796bebbe34fc97dccff5a3b149fd75a77dfb944a83ef2ca194a38a38a964737a5514e3ffa5fac8a7c37424f0304568580663d02e0bac836f3dca534e", 0x44}, {&(0x7f0000000280)="98e728d684278b4ae979bc26df35ce58493eb078cd3f1507f70318c8c0f67d5f3a7602bc0be4c3be959fa108c1dd420f06e4e2bc78209816cd18cf882d559f78720b6da6bb6bf76a1228d511faeea969e54686f9640cf1e66033981b09f451667305c86aa07a1fec762d005dd44ab9313393581152307e3dc652b9e7275037980533d66a98b9d34f624f4f8a58853d52f23bdb11787c73c90a3dcc103d6068d13205f642a418a93d5493b423134be0face9721cddeeec02c00a15021e65d0972820314a904d55bfa1624d0", 0xcb}], 0x3}, 0x840) 17:44:21 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x600000000000000, 0x12], [0xc1]}) 17:44:21 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5c000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:21 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x11000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:21 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x12000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:21 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x68000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 788.944795][ T8089] kvm [8080]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 788.969915][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:21 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x18300, 0x0) ioctl$VIDIOC_S_OUTPUT(r0, 0xc004562f, &(0x7f0000000040)=0x2) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) [ 788.995586][ T8063] device ifb0 entered promiscuous mode [ 789.009653][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 789.079491][ T8066] device ifb0 left promiscuous mode 17:44:22 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x68}) 17:44:22 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1f000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:22 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6c000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:22 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'veth1_to_team\x00', 0x1000}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) r1 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x0, 0x2) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000200)={0x8001007, 0x4ac0, 0x3}) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000100)=r1) getsockopt$netlink(r1, 0x10e, 0x2, &(0x7f00000000c0)=""/29, 0xffffffffffffffff) sendmsg$nl_generic(r1, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000008}, 0xc, &(0x7f0000000180)={&(0x7f0000000740)={0x20c, 0x10, 0x4, 0x70bd2d, 0x25dfdbfd, {0x1}, [@generic="af234c638c8f16a4fe7852d8243f72c3ec7b8dfd5806ce24a6f9415aa38566bba865bea26f87d76d05c0ea0ef2625e18055e9609bbdad07cfe20bfd2684302d8f89176463d5b3b182d695333b6e202cc445e83c05032e6f43de53d1b9e22bd19bd6b955a0ab5a2ac882d3f0fd3bb30b9aa7fb29235f99c0dcd39e9bd25e0e57ecde85b3f33ed37ec70933ea09fab06c2a8b8407d9b7abfd0dbb7e4872f90fb0e7b86cfb1", @typed={0x8, 0x43, @str='\x00'}, @nested={0xfc, 0x6c, [@generic="a256f0fe6fcf8d6e474bd3d9ce469c245bce1ce45d0208a9e6082c9f92b2f855259bd14daa9402d348f29f5589ac69406d215747b13084ab7970a53ff11fefc040308c552d068aba60fa47288c3154315b2c7a32576f003c8ae991f3a71edc7e55af995cb5728f6f6d9c7d69364c5895e3597f1245f5340db90d0b9e9a1e2a78c79e7c125878a3e158cf2a2ddeb39eda94a31ea983769ab6509861bac8dedbfebe99c11718b6f6ff8a0464e13db16a1e7930ebe90923a25a7d6ebef10fa40c78d4eb1e341e44d62bfb556d8433c9e0682191cb465b224ac78c56c9a056a65edb519c6e4ea84970604ca582b91f6f9521211e7928c0bb"]}, @typed={0xc, 0x27, @u64=0x9}, @typed={0x44, 0x44, @binary="e38af9d1c820c4d00667bac6b7eb39c9a2927ced6cc8fc3603d90d57f3901822000ad2182f954b1ea4e3b73eeced170055dd9e2c24b7c8de86c3dd0e2a3eb920"}]}, 0x20c}, 0x1, 0x0, 0x0, 0x840}, 0x20000000) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0xfff, 0x200002) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000380)={0x1f, {{0xa, 0x4e22, 0x101, @loopback, 0x4}}, 0x1, 0x6, [{{0xa, 0x4e20, 0x5, @mcast1, 0x3f}}, {{0xa, 0x4e25, 0x4, @ipv4={[], [], @empty}, 0xfffffffb}}, {{0xa, 0x4e22, 0x5, @empty, 0x2}}, {{0xa, 0x4e20, 0x6, @local, 0x3}}, {{0xa, 0x4e24, 0x8, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x72d}}, {{0xa, 0x4e20, 0x0, @loopback, 0x2}}]}, 0x390) 17:44:22 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x60001c000000000, 0x12], [0xc1]}) [ 789.456222][ T8127] device ifb0 entered promiscuous mode [ 789.491448][ T8127] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 789.522758][ T8137] kvm [8122]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 789.548330][ T8138] device ifb0 left promiscuous mode [ 789.732393][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 789.823154][ T8127] device ifb0 entered promiscuous mode [ 789.856892][ T8127] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:44:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0xbcb1) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:44:22 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x20000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:22 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x74000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:22 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) [ 789.887830][ T8138] device ifb0 left promiscuous mode 17:44:22 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x601004000000000, 0x12], [0xc1]}) 17:44:22 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x20100000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 790.004056][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:22 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x25000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:22 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x6c}) 17:44:22 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x7a000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:22 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x800, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f00000000c0)=0x4) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) r2 = open(&(0x7f0000000000)='./file0\x00', 0x400, 0x0) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x3, 0x1, 0x3000}, 0x4) [ 790.199684][ T8172] kvm [8169]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:44:23 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x260f0000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 790.365198][ T8188] device ifb0 entered promiscuous mode 17:44:23 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) [ 790.407259][ T8188] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 790.466169][ T8197] device ifb0 left promiscuous mode [ 790.744331][ T8188] device ifb0 entered promiscuous mode [ 790.775779][ T8188] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 790.819241][ T8197] device ifb0 left promiscuous mode 17:44:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000002c0)='+', 0x1}], 0x1}, 0xc100) writev(r2, &(0x7f0000000040)=[{&(0x7f0000001c80)="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", 0x551}], 0x1) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) 17:44:23 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x2a010000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:23 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x700000000000000, 0x12], [0xc1]}) 17:44:23 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:23 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) 17:44:23 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3f000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:23 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x74}) 17:44:23 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8, 0x240100) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socket$isdn(0x22, 0x3, 0x3) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f00000003c0)={r0}) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x117}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000200)={0xb, 0x10, 0xfa00, {&(0x7f00000000c0), r2, 0x1}}, 0x18) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000380)={'ifb0\x00\x03\x00`\\\x00\x00\x00\xec\x00', 0x2}) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000280)={0x0, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e21, @empty}, {0x2, 0x4e23, @local}, 0x100, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000240)='lapb0\x00', 0x101, 0xffe, 0x8}) ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4068aea3, &(0x7f0000000300)={0x7b, 0x0, [0x100000001, 0x20, 0x8, 0x9]}) [ 791.010357][ T8222] kvm [8220]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 791.092781][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:23 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x70001c000000000, 0x12], [0xc1]}) 17:44:23 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x97ffffff, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:23 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x40000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 791.179405][ T8239] device ifb0 entered promiscuous mode [ 791.210368][ T8239] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:44:24 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) [ 791.261813][ T8255] device ifb0 left promiscuous mode [ 791.401569][ T8277] kvm [8256]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 791.521878][ T8239] device ifb0 entered promiscuous mode [ 791.539909][ T8239] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 791.593318][ T8255] device ifb0 left promiscuous mode [ 791.872170][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r2 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) sendto$inet6(r2, &(0x7f0000000200)="1f84c43fdfcc1bd19bc85fb9eeb158e230cd33326cd5ae87e8692654fdde42397d4214d383c16864d6fc49809df8df60d50b71ed13a2c04fca718dc8f777224b125367e43bb4b8d0cef02f5711fc359309d172236cac316e8505b42512744ddd383d55385f26d7f3baa082d023385d2650e1fd44a903c4f48ca6e518762d1dc80d89ef09f0c0c2e165bad62a8cd9c8346ef0168b1f458a0b91acc280118a9e3f63efde9ce7f5ef8cffc4883f0fc4741d7f0428d3de8840c8f0bd7ce4eb8f1667ff56e26b9745fc8bf932ebc98938de", 0xcf, 0x3fff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000000)) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x400000, 0x0) ioctl$PPPIOCSMRU1(r3, 0x40047452, &(0x7f0000000080)=0xfffffffffffffff4) r4 = accept4(r2, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:44:24 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x48000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:24 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)) 17:44:24 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xc0ed0000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:24 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x7a}) 17:44:24 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x701004000000000, 0x12], [0xc1]}) [ 791.997488][ T8330] device ifb0 entered promiscuous mode [ 792.013188][ T8328] __ntfs_error: 59 callbacks suppressed [ 792.013199][ T8328] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 792.040787][ T8330] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:44:24 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x4b010000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 792.066317][ T8335] kvm [8321]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 792.084200][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 792.113783][ T8338] device ifb0 left promiscuous mode [ 792.143126][ T8328] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 17:44:24 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x4c000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 792.196340][ T8328] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. [ 792.283622][ T8328] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 792.309440][ T8330] device ifb0 entered promiscuous mode 17:44:25 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x50010000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:25 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_OUTPUT(r1, 0xc004562f, &(0x7f0000000040)=0x4) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000001380)={'nr0\x00', 0x2000}) r2 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x554, 0x210000) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f0000000300)={0x2e9e, 0x5, 0x9, 0xf6, &(0x7f0000000100)=""/246, 0x1000, &(0x7f0000000380)=""/4096, 0xf1, &(0x7f0000000200)=""/241}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) ioctl$VIDIOC_QUERYMENU(r2, 0xc02c5625, &(0x7f0000000080)={0x40, 0x471, @name="8cf88bb0295af23fee49915c075df981a048c8deec4dfeb12a47bbbf9d53fa55"}) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) set_mempolicy(0x3, &(0x7f00000013c0)=0x3f, 0x3) [ 792.350519][ T8328] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 792.369801][ T8330] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 792.374252][ T8328] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. [ 792.397885][ T8338] device ifb0 left promiscuous mode 17:44:25 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x800000000000000, 0x12], [0xc1]}) 17:44:25 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x5a020000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 792.633910][ T8368] kvm [8360]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 792.865639][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r2 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) r3 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$SCSI_IOCTL_STOP_UNIT(r3, 0x6) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:44:25 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x5c000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:25 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xe0ffffff, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:25 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x300}) 17:44:25 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x801004000000000, 0x12], [0xc1]}) 17:44:25 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) [ 793.106933][ T8395] device ifb0 entered promiscuous mode [ 793.111651][ T8393] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 793.146645][ T8395] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 793.156312][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 793.178885][ T8403] kvm [8389]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:44:25 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x68000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 793.194100][ T8393] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 793.215347][ T8400] device ifb0 left promiscuous mode [ 793.245714][ T8393] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. [ 793.361790][ T8393] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. 17:44:26 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xebffffff, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:26 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6c000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:26 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x70010000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:26 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) ioctl$SIOCX25GCALLUSERDATA(r1, 0x89e4, &(0x7f00000000c0)={0x70, "365270a7b3b4e9b6c7bf15c4848f4d8a72ccd062b200a7badc58e6e0f1b5221a39f2389cc3267eb84d56a884883661d81f83da331baad4f5ab1656b6254f9b471ce9cb3c29134078ec5b6aa4df024d749763e7ca76e08bfa28f8d97a66668f28bdd28e523b1dc23a0f60f57015944127c2932717ebb74d4aa9ce93a9cf313a91"}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x4000, 0x0) ioctl$SIOCAX25NOUID(r2, 0x89e3, &(0x7f0000000040)=0x1) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00', 0x80000000000}) [ 793.649360][ T8404] device ifb0 entered promiscuous mode [ 793.674167][ T8395] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:44:26 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x900000000000000, 0x12], [0xc1]}) [ 793.912249][ T8438] kvm [8433]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 793.951918][ T8432] device ifb0 left promiscuous mode [ 793.957286][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r2 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) setsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f0000000000)=0x6, 0x4) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:44:26 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:26 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x74000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:26 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x500}) 17:44:26 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001ac0)='/proc/sys/net/ipv4/vs/E\xd3.\xc9@\xb9iG/\xe555IOa\xc3', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001c80)={'team0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001cc0)={{{@in=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000001dc0)=0xe8) sendmmsg$inet6(r1, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f00000000c0)="76e6992238db185535613bb1bc1a133a501c47f1ec1981ed421b77c0701e577018d10772df84d8972d06fab8b3cec0d3815310f92de1ec988faf615713cba427192102f50cffe353d4c542ea7e3b53aa7956c249ae7eab6061adc58f9f1198d79930d0f4c70c6af667462e07c4499e7d6015f298b9295cfa56fcb0c1366dd62b03dca281900b1d4fb41b7739", 0x8c}, {&(0x7f0000000180)="1ddb4b7177db0b2a73a59c804954eb4427cb2b61e56198f4be9c4a977bf22fc74c2473b0864c9b5451d4d64a65fc2834a91594df36ba80c6630315e387912f5d66f955", 0x43}, {&(0x7f0000000200)="0b15e28219625060acbc3c1ad0e60d7e150656a1add0ffc6ed1b0b37e68be750caf5b35d21e490073a3604495c28a9076ed963b7dfe54a5687363f", 0x3b}, {&(0x7f0000000240)='l', 0x1}, {&(0x7f0000000280)="a87c01b081ecdbfbad0f54323a9bb48d48cb9b7086fe93c62d3d562ce2d7aa6d2030169f22f7e8ca5b8a0549f1473dd637a046242e0a2da7e51ac5dc575f7c82188bd9fdfbeac4401a1a9588f06466fd6dbbf1f4b767977598c27a01fdd7002f62d9638f71eec7172781d6c612f7", 0x6e}, {&(0x7f0000000380)="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", 0x1000}, {&(0x7f0000000300)="c4e9d8d96b9eef708a629b17fd66abacb9d9b5717c593e61da009073ac60d9e386adbcf4c53b63", 0x27}], 0x7, &(0x7f0000001400)=[@rthdr={{0xa8, 0x29, 0x39, {0x87, 0x12, 0x2, 0x7ff, 0x0, [@mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev={0xfe, 0x80, [], 0x13}, @loopback, @dev={0xfe, 0x80, [], 0x12}, @ipv4={[], [], @rand_addr=0x2}, @rand_addr="31bb38efea3bd708b767fd41867de693", @rand_addr="ccbe308b5486e9d140c6ba020bddfb77", @local]}}}], 0xa8}}, {{&(0x7f00000014c0)={0xa, 0x4e22, 0x8, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x19d}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001500)="bfaac68ca42162dc5c496af080f7f895d7c627a31885fbace9f2a5047e9f63c81a528191fd1495d642d1b9361640bce9a14f9667628b96c6af428229c79fa0eacb3b38ed1528c746b6dc1a8f99b291a8f1b5ad22180ce01fb6992e14740976212e1f452a55ae96", 0x67}, {&(0x7f0000001580)="e3905fc51fad7a6a8e5665ad7e44105536a467b0fd07e365ee181265946814345855d3b332acac008d7010fe57c41da7822b6e67a92aa8e0b66448d1c1466f6cea4ca94f3ebefd6a38b6afe5390985bed350d6c24a592bf6dd156e5bf64f82eb7cc4d37b951897b2b1daf9b0c016e01cea432662fd2eb536543c1124529e6bfb340ca748ec93cd9434e32abca791421d45e8dfea054cbf0a5e44d7520d0c451ca7e07a5fd3d03b87887d2d39c8fc00577dc29d24e698c178a2abab3f86d1", 0xbe}, {&(0x7f0000001640)="ccb13128c65f099920c81abe147525dc1692a4a8d800bec3098af37575b796bb02e0246f0042df1e90a66afd23260d7b395555ec8438351876b974d4e5054ba563c52df369b22d2b0f94fa0ffb63ea06e9f581b23e5e25e0ea46cf117544c8b9023b239e497d30da43e979a3da59fd62fbd37c3a4cfe2fb9aa", 0x79}, {&(0x7f00000016c0)="bf44d5f7aaf0583f839646d027efab6dd843d61897058305af3b57a99a91b075adb5e598b7d7847f3e1e675a0cd6d5498f9256c2e10c023bfd7faad090ee7c93e6fcf1e70e79d7c4f7", 0x49}, {&(0x7f0000001740)="dd7b37c56f019ed42cde167aa9b5057c1f7b86d627549e320f9a271dccc8d9574783e284c9453406e3b882173ace7c0d0564c00c4cddfc243cf329796d8193b86866ae4a64cdc0312b7f00987d241ed370aaf796db0e51961bf40863e9085511f6ff71f0413becc4b12daa8c2fab086cc2b209465a6d91fefb314debc34a5fd831fbb521bed8ab4f230229f60ebb34bf28242ad051cc1c211c2ab16a548ef58c4375dc95c0b8c6f181a1db0d6a84b51def6cb1c059b7748cfbae65252b01ab51d1b69518005872ea6cb3667a6ea3db7026d5854a04972766775d25317f1ac9ad0e470ff48602ec8a0067d58b63a30d806c726b3d5ec3eaac95943fafe7", 0xfd}, {&(0x7f0000001840)="e18e4541b18d7e1d567622026cd8dae646ae3c7d35dbeceb7e7c1c", 0x1b}, {&(0x7f0000001880)="edbc2c05b58f5ce527ef08d2e48149c3a5eec6a3", 0x14}, {&(0x7f00000018c0)="b5c1f9da5f4d", 0x6}], 0x8}}, {{&(0x7f0000001980)={0xa, 0x4e23, 0xffff, @ipv4={[], [], @multicast1}, 0x8}, 0x1c, &(0x7f0000001a00)=[{&(0x7f00000019c0)="cd", 0x1}], 0x1, &(0x7f0000001e00)=[@hopopts={{0x110, 0x29, 0x36, {0x0, 0x1e, [], [@jumbo={0xc2, 0x4, 0x3}, @ra, @calipso={0x7, 0x50, {0x1f, 0x12, 0x7, 0x7fffffff, [0x2c1c, 0x7, 0x7fff, 0x6, 0x5, 0x0, 0x27, 0x5, 0x7f]}}, @pad1, @hao={0xc9, 0x10, @mcast1}, @ra={0x5, 0x2, 0xff}, @calipso={0x7, 0x28, {0xa1, 0x8, 0x2, 0xffffffffffffff51, [0x7, 0x1, 0x80000001, 0x800]}}, @calipso={0x7, 0x48, {0x2, 0x10, 0x4, 0x7, [0x1826, 0x800, 0x288, 0x9c, 0xa66, 0xffffffff80000001, 0x8001, 0xfffffffffffffff9]}}, @jumbo, @ra={0x5, 0x2, 0x8001}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@empty, r2}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x6}}, @pktinfo={{0x24, 0x29, 0x32, {@loopback, r3}}}, @hopopts_2292={{0x18, 0x29, 0x36, {0xfb}}}], 0x190}}, {{&(0x7f0000001fc0)={0xa, 0x4e23, 0x0, @mcast2, 0x3}, 0x1c, &(0x7f0000002240)=[{&(0x7f0000002000)="7232bbe6542c827df601eda71474ebc5ff7fd9be4d980dc428bc24bc93bf2548fe88272c8d391b25f67c32408758b665f8cea0c44178662edf2e3c5e34bd394b1dc1674953c99b21d9d991b58b625cf70f2ff137", 0x54}, {&(0x7f0000002080)="b93b0d6364f284323f2ad174193d0040", 0x10}, {&(0x7f00000020c0)="3170a2beb16ebe1ba66ffd0ce82094e538fb8d5969896e65f3d85df871f1dd732a24497423ced85b3b20abe8726ce0163201e7da7ccccf5cd0016531cc7e469c19b5c7ae318a2430d94bccaf090c37448c824927759f9e8ac5fa9852faa64cdb25cfc15597e762877f88033a3fb3abc8c567293628b97e32135f5f05663435ba1e6c8bc3e9115296fdd48b83643e25d35dd728c99acbef0f30f42fab8322c5381c", 0xa1}, {&(0x7f0000002180)="10bfe12a7f714656f95cf1629453b96d77e9f25209b2b7a0d283ca231247b0f9590d920c055d8a70065b36f7f8faf7bbdf4f6273d4e7772ccc024ff614", 0x3d}, {&(0x7f00000021c0)="c9bebc9f49d39aa5419c7704c8e7cde0b7e43af26e37aef6fdc37b0f98cd784483", 0x21}, {&(0x7f0000002200)}], 0x6, &(0x7f00000022c0)=[@hoplimit={{0x14, 0x29, 0x34, 0x9}}], 0x18}}, {{&(0x7f0000002300)={0xa, 0x4e24, 0x1, @mcast2, 0xffff}, 0x1c, &(0x7f0000003580)=[{&(0x7f0000002340)="5bcf218c844357c1185f28efbddce90f48f9ce65f07bc2a7e28e71ab28e20a50211f92a2", 0x24}, {&(0x7f0000002380)="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", 0x1000}, {&(0x7f0000003380)="13a39ec15c2509e7fcc4302f81203a2c90ceff86abe5d9ac7d4bcb09676f5a95f5fb4f30aeff0970b4841b231811bb473d2eae96d18fa7b6eabdf9c21e22b5b129d9716c92a3095b3915f689af549ca2a08cf05ebf70d17be016c105adcefec28b9f5c4a72f7c64cc7910e5e1289c3bcce2ac0d44c4bad80eb553d0bc0b1948354a6e01c61a1362cae4a6da2ac468ba420806993e5e9586ced4977cf2e48bd436aeb3decbf9d9d261c2049145e7883aff981f59b799dc2016e310ed565b262e120e89d1a", 0xc4}, {&(0x7f0000003480)="eec0f025e55c86ee7be79dd5e8e74c8fb65604b906ede6872871f134c2254a5e79c00569c35b4ef681d371138d84c408b03cca46969d93c88e7290adfcbbc0ea33b57bc37617d49c9688bddaa61e6a742ffb5920522b784b572b3b07cc9d33b2fbbb8cb009e83efb9f4e33e0dcfcaf6dcd39a16e749babf75d3ceef63c814cf5f32338b0a9b668ff3b72a1e8", 0x8c}, {&(0x7f0000003540)="1190b31d97ec6c90d0", 0x9}], 0x5, &(0x7f0000003600)=[@hopopts={{0x160, 0x29, 0x36, {0x3e, 0x28, [], [@generic={0x1f, 0xfa, "9874b178fc35328176de77edfab3716c701eecb33aa117f0058865f8d8046e7657d7010767df1dbe590c7a593ff471a4566ed180cc07db03a1fe8c55130692cbb72e0119e3bb61ddf7a0241ead8611b6d8d26c50eba4f32966f56c493cb3812644d493e22013ca602a2e577e7eadf0717d62c2ae195bd127b5b779afd75b6d125a24580a816fbfa12048e32ec3399b0a3cd82cf506baab35a1bdb5f3cd696aadb80907169dcabefcb13a9b8f408aff1727e5e9fea4ad211d7dea7b90feb763918b77b704a7ccfed80e420e36fbae10f0ab8e383497ee4ac90552b64119874965ab4c5079896b655f8c2d12df116345d75cf10e54e44c180ca7bc"}, @generic={0x1, 0x42, "6e49e43a685b5f9bd1a71dfc8c45ce0309293693204d443dbd1ba59c908400132609aaadfcbf3aa6b6b13f6945961180b21017fdf18f715bfcac06499db4e176d14e"}, @enc_lim={0x4, 0x1, 0xfffffffffffffffc}, @ra={0x5, 0x2, 0x6}]}}}], 0x160}}, {{&(0x7f0000003780)={0xa, 0x4e21, 0x20, @mcast1, 0xc1a}, 0x1c, &(0x7f00000038c0)=[{&(0x7f00000037c0)="4912295915225c7182de50c3bf11ebcf4ed7e81193dac9ea4f0c26e98a1ae4f92265ecc41a0bb08040795396cd3724d04164245fb339cd3e465d04db1f5d9783de9e91e7117839a6c9f73c832744eb2c22386529714ba6dd3bedb7ab9a08a5a65c6cc5c0ddaef00437bc6d6a274dce90157f4a8833d5f85cca037a2e8bdd9194c547ef16420a4fdf02cc3d00833afc22b6d0bab782b04c8ced677536789158ffe89b60c64eece53e2ad59543509a5a3b20dafed889f53bd042cba508bbf83c9afa099bd811d1f6074a415a57b22839e22953271b98a02211662eaee95e1f41e6f7d613960775ad1040", 0xe9}], 0x1, &(0x7f0000003900)=[@dontfrag={{0x14, 0x29, 0x3e, 0x6}}, @rthdr={{0x28, 0x29, 0x39, {0x87, 0x2, 0x1, 0x8, 0x0, [@local]}}}], 0x40}}, {{&(0x7f0000003940)={0xa, 0x4e22, 0x200040000, @mcast1, 0x7}, 0x1c, &(0x7f0000003a40)=[{&(0x7f0000003980)="82191d66288dcc59b6e9489b6a1b1302ec2b18714e356b7f8fd139b19a2334b573c5d849eeefea35158b0c3a8f3202f804855304cc1b51120e564ccd89ea0b06e3517342aaa0e6559befad698c554989d250c01f5534c832d238d2480fb92c2d0b4795b2bed9b9e5936fad2551", 0x6d}, {&(0x7f0000003a00)="632d9b468893b059c3fa1356f5a096fbfc357497b2f75ab9cfa995368a92159754f57bd38fe6", 0x26}], 0x2, &(0x7f0000003a80)=[@rthdr={{0x38, 0x29, 0x39, {0x2f, 0x4, 0x2, 0x1ff, 0x0, [@dev={0xfe, 0x80, [], 0x18}, @empty]}}}, @flowinfo={{0x14, 0x29, 0xb, 0xa2f}}, @hopopts={{0x98, 0x29, 0x36, {0x2f, 0xf, [], [@calipso={0x7, 0x58, {0x0, 0x14, 0x3, 0x1, [0x7, 0x9, 0x6, 0x3f, 0xfffffffffffffff9, 0x7, 0x0, 0x5, 0x4a, 0x8]}}, @padn={0x1, 0x2, [0x0, 0x0]}, @ra={0x5, 0x2, 0x80000001}, @enc_lim, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @loopback}]}}}, @hopopts_2292={{0x120, 0x29, 0x36, {0x5c, 0x20, [], [@padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @generic={0xc, 0xc9, "acee8fa29d0092e30921d52f45c265029f15794799cd70bd9379e3cafc1d29669dc26e9c16f67466346ac7cfabdaadcb18cf20c11993b2793064dafc75b23ed4a4b74ae28441f8e23d82b813c1624ffa643018d716e2386d1e61adf48356abdd84fab07ae4197bc1d2fda1dd4e3123be40e76197d01720cc057687d124423db09ff99bd74054a6317347dd9b59b03bc9e1eaeff2e8bba5bbe3c1914d77800845cc6356103acb2ad3ee8d9b2012bdd431fab3620b1c7cf2391e40817f98db81f3584f05c53da0b8d4b8"}, @enc_lim={0x4, 0x1, 0x7}, @hao={0xc9, 0x10, @empty}, @padn={0x1, 0x2, [0x0, 0x0]}, @calipso={0x7, 0x18, {0x9, 0x4, 0x5, 0x2000000000000000, [0x7, 0xf1]}}]}}}], 0x208}}], 0x7, 0x5) getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000001a40)=0xc03343d, &(0x7f0000001a80)=0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r4, 0x0, 0x2, &(0x7f0000000040)={0x7, 0x6, 0xbf79, 0x400}, 0x10) 17:44:26 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xa00000000000000, 0x12], [0xc1]}) [ 794.204228][ T8451] device ifb0 entered promiscuous mode 17:44:27 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7a000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 794.284526][ T8451] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 794.306003][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:27 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xf9fdffff, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 794.409382][ T8474] kvm [8463]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:44:27 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:27 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x97ffffff, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 794.651243][ T8465] device ifb0 left promiscuous mode 17:44:27 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xfdfdffff, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 794.698348][ T8451] device ifb0 entered promiscuous mode [ 794.728834][ T8451] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:44:27 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xa01000000000000, 0x12], [0xc1]}) [ 794.934123][ T8500] kvm [8495]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 794.972335][ T8456] device ifb0 left promiscuous mode [ 795.105501][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r2 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) ioctl$SIOCX25GCAUSEDIAG(r2, 0x89e6, &(0x7f0000000000)={0x6, 0x26}) 17:44:27 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xc0ed0000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:27 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xfdffffff, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:27 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00', 0x8}) 17:44:27 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x600}) 17:44:27 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xb00000000000000, 0x12], [0xc1]}) [ 795.311148][ T8518] device ifb0 entered promiscuous mode [ 795.338102][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:44:28 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xebffffff, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 795.361822][ T8526] device ifb0 left promiscuous mode [ 795.374387][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 795.389218][ T8534] kvm [8517]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:44:28 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xfffffdf9, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:28 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xf0030000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:28 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xd, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x3b, 0x54}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153}, 0x3e) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x410040, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x4000, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x100009) r2 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x8, 0x96400) setsockopt$MISDN_TIME_STAMP(r2, 0x0, 0x1, &(0x7f0000000180)=0x1, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'netdevsim0\x00', 0x30000000000}) r3 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x80000001, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r3, 0x4010aeab, &(0x7f0000000100)={0xde7b}) symlinkat(&(0x7f0000000000)='./file0\x00', r3, &(0x7f0000000080)='./file0\x00') 17:44:28 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xf2030000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 795.691363][ T8518] device ifb0 entered promiscuous mode [ 795.729270][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 795.780988][ T8532] device ifb0 left promiscuous mode 17:44:28 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x100, 0x0) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40004}, 0xc, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="00000000319938669a64ff7a7db253c21f9050e00bd0d2f7912b4f8d6ef9ed4a61217f6545d79dfe000becec57308a248fc0bb4b4ae014b4ca8f22344846292a2166b6cfbc2b8fc0d086025ad6e00b435691b7af9ae56ea947b1dcaed682c936b7a63ba90b350a5618fb570d0905fdcbc170b63f99bb1fafe26f0a1ee2ece6bb538a16bdb4b110ffc46eece84bb629ac23dbacfdfcc45f5a9427", @ANYRES16=r3, @ANYBLOB="000225bd7000fddbdf250400000008000500010000000800050005000000080002000300000014000100fe88000000000000000000000000000108000300040000000800020000100000080006000900000014000100fe8000000000000000000000000000bb"], 0x6c}, 0x1, 0x0, 0x0, 0xc1}, 0x4000000) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) shutdown(r4, 0x0) recvmsg(r4, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x1) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(r2, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) 17:44:29 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:29 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xc00000000000000, 0x12], [0xc1]}) 17:44:29 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffff7f, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:29 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x700}) 17:44:29 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$x25(r1, &(0x7f0000000040)={0x9, @null=' \x00'}, 0x12) 17:44:29 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000040)=@int=0x1, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) [ 796.379230][ T8599] device ifb0 entered promiscuous mode [ 796.416047][ T8591] kvm [8589]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 796.444907][ T8599] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 796.445747][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:29 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xf9fdffff, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:29 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:29 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfa030000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:29 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfb030000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:29 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffff97, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 797.107225][ T8632] __ntfs_error: 50 callbacks suppressed [ 797.107235][ T8632] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 797.138380][ T8610] device ifb0 left promiscuous mode [ 797.148313][ T8599] device ifb0 entered promiscuous mode [ 797.155699][ T8632] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 797.175642][ T8599] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 797.185291][ T8632] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. 17:44:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r2 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000000)={{{@in=@multicast2, @in=@remote}}, {{@in=@dev}, 0x0, @in6=@initdev}}, &(0x7f0000000180)=0xe8) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:44:30 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xd00000000000000, 0x12], [0xc1]}) 17:44:30 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfc010000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:30 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffe0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 797.570881][ T8652] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 797.578696][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 797.605454][ T8635] device ifb0 left promiscuous mode [ 797.622621][ T8656] kvm [8646]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:44:30 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x900}) 17:44:30 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfc030000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:30 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = socket(0x8, 0xf, 0x0) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f0000000000)={0x0, 0x101, 0xfffffffffffffffb}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) [ 797.696804][ T8652] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 797.727867][ T8652] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. 17:44:30 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffeb, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 797.840163][ T8665] device ifb0 entered promiscuous mode [ 797.922389][ T8665] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:44:30 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfd030000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:30 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xe00000000000000, 0x12], [0xc1]}) [ 797.985316][ T8666] device ifb0 left promiscuous mode [ 798.041807][ T8672] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 798.109076][ T8672] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 798.187939][ T8672] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. 17:44:30 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfdfdffff, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 798.229581][ T8682] kvm [8676]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 798.301873][ T8672] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. 17:44:31 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 798.456938][ T8670] device ifb0 entered promiscuous mode [ 798.470057][ T8665] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 798.502397][ T8691] device ifb0 left promiscuous mode 17:44:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22, 0x468, @rand_addr, 0x9}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:44:31 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfdffffff, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:31 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xfffffffd, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:31 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfe030000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 798.702860][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 798.874651][ T8670] device ifb0 entered promiscuous mode 17:44:31 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0xa00}) 17:44:31 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xff030000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:31 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x1000000000000000, 0x12], [0xc1]}) 17:44:31 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:31 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) 17:44:31 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfffffdf9, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 799.076646][ T8728] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 799.122803][ T8727] device ifb0 left promiscuous mode 17:44:31 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 799.174306][ T8734] kvm [8725]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:44:31 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfffffdfd, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 799.478341][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r2 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x60, "92d7d8e5eaaa8eb2e98c103037045eb1a7c495771e17e0483223d90a9c33638290cacb84cbf486e8712061cf82819c01cc996bdb547ffd8c4372bb76f8d9342c7a589cdd8999f706d76b6082597e6419c6182d9f9eaf5383debcbf0de0452fd8"}, &(0x7f0000000080)=0x68) setsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=r3, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:44:32 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xffffff7f, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:32 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xedc000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 799.518816][ T8728] device ifb0 entered promiscuous mode [ 799.524646][ T8728] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:44:32 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 799.612671][ T8750] device ifb0 left promiscuous mode [ 799.687146][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:32 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0xb00}) 17:44:32 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:32 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xffffff97, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:32 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = request_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='ifb0\x00\x03\x00`\\\x00\x00\x00l\x00', 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r1, &(0x7f00000000c0)='blacklist\x00', 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) syz_open_dev$vivid(&(0x7f0000000300)='/dev/video#\x00', 0x3, 0x2) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x400100, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e22, @broadcast}}, [0x829, 0x2, 0xd55, 0x2, 0x7, 0x40, 0x5, 0x400000, 0x9, 0x8, 0x80d, 0xe9, 0x6668, 0x40, 0xfffffffffffffff9]}, &(0x7f0000000240)=0x100) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000280)={r3, 0x8, 0x101, 0x9}, &(0x7f00000002c0)=0x10) 17:44:32 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x1100000000000000, 0x12], [0xc1]}) 17:44:32 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffeb, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 800.012751][ T8779] kvm [8773]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:44:32 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = fcntl$getown(r0, 0x9) migrate_pages(r1, 0x7d, &(0x7f0000000000)=0x1, &(0x7f0000000040)=0xfe7f) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) 17:44:32 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 800.125345][ T8787] device ifb0 entered promiscuous mode [ 800.148625][ T8787] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 800.404221][ T8798] device ifb0 left promiscuous mode [ 800.427117][ T8792] device ifb0 entered promiscuous mode [ 800.436505][ T8805] device ifb0 left promiscuous mode [ 800.447550][ T8787] device ifb0 entered promiscuous mode [ 800.468232][ T8787] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 800.477348][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @rand_addr, 0xd2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r2 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000000c0)='vegas\x00', 0x19a3f356895e0d43) bind$inet6(r2, 0x0, 0x2b2) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x2}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000200)={r3, @in6={{0xa, 0x4e23, 0x7, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8}}, 0x31, 0x9a72, 0x0, 0x1, 0x401}, &(0x7f0000000080)=0x98) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:44:33 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:33 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x1200000000000000, 0x12], [0xc1]}) 17:44:33 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000040)={@in6={{0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0xc}, 0x2}}, 0x0, 0x9, 0x0, "22cdd1c91bdf0e8517acf46755e53c29e358a2a4d10c61928b683b56b884c57ff740f1a9d2318349702144bec5ca5c1b0c02c148254f6d106c09d50bc672972b38f1088cb1773bb68f7981dae48ee9d8"}, 0xd8) 17:44:33 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0xc00}) 17:44:33 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:33 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfffffffd, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 800.675814][ T8819] kvm [8810]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 800.686433][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 800.703319][ T8822] device ifb0 left promiscuous mode 17:44:33 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:33 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:33 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x80000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:33 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x401c0, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r1, 0x4004af61, &(0x7f0000000080)=0x1) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) 17:44:33 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x150001c000000000, 0x12], [0xc1]}) [ 801.119871][ T8821] device ifb0 entered promiscuous mode [ 801.127585][ T8821] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 801.200611][ T8846] device ifb0 left promiscuous mode [ 801.335233][ T8860] kvm [8851]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 801.491135][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:34 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xedc000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:34 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:34 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0xd00}) 17:44:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x81, 0x0) ioctl$VIDIOC_S_FMT(r2, 0xc0d05605, &(0x7f0000000200)={0x0, @vbi={0x2, 0x1, 0x2, 0x3635565e, [0xffff, 0x2e8], [0x6, 0xcdd9], 0x3}}) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(r2, 0x0, 0x200000080000) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r3 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(r2, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(r3, 0x0, 0x943db1dbe0fb9710) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(r3, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:44:34 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) write$binfmt_script(r0, &(0x7f00000016c0)=ANY=[@ANYBLOB="2321202e2f66696c65d3202f6465762f61646d6d6964692300203a202f6465762f61646d6d6964692300202f6465762f61646d01df9d19ce5ade8b59a716da626d69e95c033cb8e09865762f61646d6d69646923002006001000000000005c0008006c000aa704872e86136de7b129491597d8ef71623b971273b0d86b1d421bee59e4cd582aab294b5ddc5ab41d7cff22cbf6a388e58e58f0585a1d791186ffffffffffff000193f0158e72f2b01c07a4e9ef33a911691f5579dabe9cd261a23e004114f33a07f9544e5b1f618ab3e310c362667f827bc7614d4a672a52b399c214bfbe1d5fa3ccc165ce5067d18fae9af1b1e2dfac5077999e167754aeff65c899b9f04679d5bb42f96a71ca814dc6af00bf8a6fe3ca4c3c7ca2e812bea6ae065efd976bf102d2ffcc3248b7a7692c2b7f26606673d8d98fad963bf68156bf5624cb257984da700bf2f71da3a5e4131be6a8b2d2ede7437affce48d4b14a461ca7befdd7b9f70c12b72723fbb912b1e93bd1c1a9bd74c373e63bb71c1acabd1ccdd69381c9bff53202bbac91d53af8b9b42bb4838809acc1bbb6af46d201595393"], 0xac) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x0, 0x2000) ioctl$CAPI_NCCI_OPENCOUNT(r1, 0x80044326, &(0x7f0000000040)=0x400) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001440)={0x0, @dev, @broadcast}, &(0x7f0000001480)=0xc) bind$bt_hci(r1, &(0x7f00000014c0)={0x1f, r2, 0x3}, 0xc) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000000180)={0x1, 0x262, &(0x7f0000000380)="9ba3032ca01cb24dc1a821267428023700969e6f44114d8a29a9b486a8bc5835c94f783ac8b3aa9bdb73c815f272ef7779294ac0deb4bd8210882685bc2b9f5e13900ff7b93eb1f8e7d386e18bd43e22726f50aed1c2a129f614c42cc30f53e32035db724de453e1d439b9e80b0e7918aaebb1cd54e3c3e7ad78f5717e900ab1a6e390e037077842fe941ea3f435e8e0f8926d98659acc9314567c097ac4c2781831229dc7bf71df944ff466176adcf243494628ecb4fedc8cb2cea53a1f9656125e4cae7332d34a7c14e53e73c0804b3fdeda3b5fed0db8ba831325d4f9eeefc6bdc67e849bd44247d50275e097962a924705aa31c0f2823d49ce36b8f5e13411adb199c58f5f982a4569aabe17d2d31658c2ab0bedc1bdd3ce22e551017b954e21726650bfa090b71b8d0d139d4af871fac509832f1ceb19cea3ddca9cc5f762af3ff7b1652f328575299e4ae1d36274c92bb683b52929a4caa8c5b424b33e118bedfcb9ec22ff9bdf8a7c9933dc800209aee99ca6479c5a369a27c8c2edc8dd00909c78ac8e282ba33d0264e6b92be16bd9ea2a373684c2c4f3ce9dda6eedab0a16e0db7cc25cacdd30389a858c6c9be603ebb9a6cef7f740445bbbfca605d69becebf9f8159168f4ed255ebee4164e534ff680a5b61dbb9d59a3043d1d9c58419f2361ae5a1e25c4581eec46901a28b8c5522ffcd78ad2c057dc596e816e03963541a6dcb3e10ba93d7d169053d7606206280b414f62448ce52604de52b835df5598e9a16173c6597d5725e2b6654577c43f34839c4a6344d40a10745c822254a45237c54e5f641ad5a7293ef1e0db427db1f48dd81c79fcf03e21ad676e0678f5ccd33503ead2c6f11cedb75cb4d4affb310e06764ca94f653239f268a6cf7a44779c47422310224c8d9ab73967f128c06e51362e9eb05129fa2e0345ccbcf0629328dc2f1d5849a67fa2dcfde05cfbb9e8a27ca5b970710af447ee68ada2765850d00c88a230b1294f69341451f0886940cebcdfc20a5d656bb568708af9de3487fdf8e8b4b2d9414dd8ed1e152fc5da05be2d426e74a1cdd3e2aebea94c4a568d12a1dc6bd9c6266e473561c5b84abe22f5a5b93f93da4e789cade66635ad117a5adf8bcc772acb58e684299297101ab485f6591bf6d97e525114d17d230bf549db08c6e31f65b9b5a2a69fefca28fed5132a488ca833518e9d0b73038d8cdb424153260361e2a6af55f4807dc7c82401ba94f3d6b8f4ac421d694cabd546164bf1af972e67365d78cf84eadaa09584c7a7b9325bf1b3ff17295fae9c17311f71d48068b414d9f074db0166b996e7a7e6485106d4e8000f5ba4561a0e6c49f872d4c57c4198faeea327246e6ab7515ff5f618a9e2d8cad8f11157fcf2518024e2ec5ce50a66475fc9516e9451f6d3c95ebe347dab79a6a8df2847dac92045a6b5818089ee4ca5d967586f1b5a8f4f350f34e099d4ac1e22e16aed3a3860a435b71a0b36213380ffad3680c334b985a3921f11fc476ad0ced096042181d437347b63e0157fe04ef86a98e22ef935e95e2546b29398a4774212232315a385006aa5b2c60b5335e6b0671ef1e2d36593b4e78390b66b904708aa8da8acb65d1d610da21b07b930364cd124d4cf92229a864acf8df9fa723c406ded2c070d2e44e7bb8df5189776c75b29561a3f8ade94e313ffac9ce1b00517112143706c328cb47a1b4c3cd89ad91dfd12000aefbe677b06794b112590fe2d279590ca3ee5fbc8fc3c383bb905255772a94bbfee1a12ef75181bfb955c8f428dcc963b50425966f13aee52d5f420254abb252736c5da2e4832273afa5f56992155c01dbed1e89f061cbc82c985d56d8c157e3f2ac0cae40474facd417e99ecb516a70bbd13ed0da08b08c6af20ab1ea6bdb5195047ae3cf2a9a54f8a20ad21db19578c7a448b7670c7231e6c5fcae5894785e8cded4322604b6b059e2e845f4c1404571880770d0fc60f5d2e955ca0ef2fb73b44c777d2e704fc37fe93ae899ee6f651f29d18e46153957119602bf1e2138c1bd1352d19fae5d581c1cbc755f834c91ecd16bad7246726b0fec356b56d06a2c13834578d6e0f0e23f5cd461b3a665fabe036d4b36db51079795bed77fdac806a6ad469c26fb56f942d6d053c81d257e7d7203984c3f681cf106f4c031e8f3250d238e93faf4340c23ad5047cc9a0d6339480be4c020eae68d2f44dfac145c42bd40f30dd961ec59f5b945dc77ee4127091abe4acd06159043389de623e24aaf80190dc4ccbd508b33f55c88b46ee987f3a96ed64be7333939c2ffa147a4b35b21bc97a9baa5160f7cb8b81ac4f7781bd497123fb3c6b828c391f2e3195cdd739119e24092d20c356c7fe632d37f35038107bfbf335c8197b174c8b19218014f087dbfc3d2b13e62e1590a23d1506282fa1d1a0d2cbc1f028b7a87b2f73e9169d8361cba25bb51e924145cc014216b2591e5596642f8a17c8532c1a18400f36f1cd7bbc1e82faaf0bebb69c5b6429b38d98aebb244f65cd070af4c92e939c12e2c66c034d837092627f15875d2562ff9f835eec635bfc80195d13f2018fc9abc5f1fbfbc4c64e1fd4f9d122758f51100310d0d82d19cf5a7fa480ecd070caa4018ba49a5ac5eb5def60c3cb6c2fd560fa3a5bf7ce86b927dda8607a13466b15ce4414c43696e5ad2ef3f2c91c6a3b68f383046880b766d3297ca0f80ec2ceb6ac7e1456276f3638c30bd20be3473dd8944cfeabc59435e67277731c0aebec0da180beb8ee9dda18a39cc46e6732790c8f3413516d054e32538de0752b849beff61de4f3001e37c68f573c07c84378412f1efb6edb686b124c279de6bc30fa52f72096277e682cc1155b01b5b8fe3661288fe5601d71176cc86b17a77f6ef14584c3c6c8b60a25e68ed2d249c2625cbadff9814328b5a9219026d6cbf563c82338d3daeb5b73691f75e6a32f2d68ee758cfbc5ae697ad7c79930e6481f2210bc7bd77a9248e2896387eda9bd6da3c8b27b21c5285e5046bb6d5facc7e9fb62263233249aa712c77c61b3acdd43b41d9fa94f0361c745454e802341ec8a612f663d03b3e1ff9f7d052ebdda6876f2d53f485763c12689c93b6c4ce9354a08f236da25294b779a9de826c740fe62f8836b47376e237661d16eb4d396d9e8b2682b2859aeaefcbe6545fdde0f8dc5a20658386840df306ba0c300ae856e9d961bb252cd42049cfb2bc2da4a8bca1db0813262721c8a5d4682a7d862e71bd7391327e8048c238b31584582580e54bd869721e65663999477fa4d9e364e01bdac79fa3e40c4239fddd33b62d6f2d70d0b1621428e6a3e1be58a3272a100bc6f3d9ee04208b8e4316329e2b34fcc42ac48d59d542a939ee2adaf916e7bb6d85009b5aa78e72512abcfe3a93a83e60aec4cfb01a9902087f5a392e0d975a6ad6c0d60e290a54bc727156519475145b77cdc7232770ddbe0fbcef9fcaaafa9aad84196d6caecf2bd8612e6b99c2f1855641f68ed70351df7d131c17a9087415345ce0e52b05bfca4ba5c0fff61a69db244231b5bae2cc22f6663928fc19ed61d4f9359b2d74dbe684f67a463cfd2b969b6da6eb0fe51790799d2e29d394d6796b609be22b3212b0a28375e26439dd04f4e5045a35bfc56f929d964abd362ce39d958758d3ecb4a63b7cb3e89a5db3d174536eda91839afa08c0bf01f63ffbdaf08075d0e41d9b6e8a747a79f8e7457b9bba69ec7702868d65648d0f24ecaf74cb09e8e5a611bf349a907943e6340c5783badc394a3fa2b4dc755f074cf114edb6eb46f34d5847b7cfb5fc207c77da5d4155a82edde5654b442fedcfe492e9964d98c98ed0af2a024c3843180e9546d174ea0f311f88f15510ecdce531949f60251c6459a2094d0c40999ad232e3d648508626db8a1b3bcc3e9ffaa8f22a3932814738a585f620dc1cee369c14d9b064d0f24d3a20a3a0ee5f219a210b0b8070471a81049d5279cf0a136bb09657a4bca8f3974055a2144a16bf9a513fada77b901b67c6efc0aab52b88e1f6289e2ef93dce0b1aef57fab7bcf578f3e382a49daad60e840765b3e4c9cb7cdca6aefcada5f893ac0805d64132f2aef8001768f2ef2cecd87cbfc4cf407ae8e524a5c1eb5d248bf75b1c5b487c1a3553274b2418324b4a701d5681ecb2b9a91524bc2e85ce785d5b2c23fc39761859235a9c8391511b33bc5f5963b85186ce18f4e167046adae2aed189d9183d173159ffca02cbe20034b6cf91da2c120f17609d7ff54e34e4cc8ef2a401cc5689c798798d4ead0926845fe5eec7be4d84e19f1e1685a0f0487a602663b43088fc7df1370f746df8ea5fb9d8ffcf795f7d8d33f40c90e6c23d996817ef21f6e2163b14c90a6ce90989e8c256157c6fefe7bf907b9978cbcdd1c112a9bbe3911b54a1ee1005fff3f27359288fbb3e8fbe273ba5f10f193ffb41c10e791f062d71e7e550717d18681e31daceee1ac688c4a8e50321ed2c5dd7e3871298321f675ce6c5a61b51996f80e47d6fe40fb296b53ff2dfa0db2ca86ba125dc03a8408aad61bbaf5520871f1644493178c78286adf092520a90081f4bbaf7aabee5e6c92cee85e2f59456220e53b088b080be73a8b65b179e0c218676be397ef66246b69161166461a25dbc297be809d73a6bc18252aa341043da9ff2b14552354b2a1bde2b54d631f7acc339b9d74b0f4075f068dc148c968de0e947f81b7f32da44d0662c52cec8837cb5f336974b6164eb72808cf86df89f52cd6f306562dd81e1ab0fea80a1caa4cbfa1306875718da97f07f41e0b6b7d07ad0e64fad89cc30999da1485846b1718f504a8c565e60f2ee0040ed988ba81639b15ba5823070f264dd486f0a14a0d958cc793faa76e332f73ae04edcee344a5ad72d8bff5cb7eec77f8c2e33e6525578c78e7a352d41b78d0a462a3e624e51de2d17b9e051475f08b5795ce892797382e74c3893746a83a5274415d3aa98c78fa3469a5b0ba51bc92a8dee098262c21463d1c13e46d5784f09704a863b1080382c2486d7043dd363e1e9db8604d093d52bab366da4bba9038b92ac4449b7a8fc179e1c58b8d4d858a3079a3604569959c2e98cbedb111cf656ef8d9ce03ecdc1a1aacfb589ff732141fc481561fb473c5be3e3804b51a5302f3ff1899eb84045cc428d66bdcacd0b20eced4327c62c3e63bb460986799bb9f90b3e8c5c434268419de3e46e4d92e9d0268bf2518614ff434b4467d845ed6244b4f7ff85be199516ae4a525422c6c4029f823cfce4343e4d4a86b48f17f67e7596b7d424f57b8574195f78ae4c47e50ee23b7abfef56b9ec6ef278de6c0dd7dd6e5e501a7fa5d16adac34b3bb679fb021e09bbfefc32371087c3fa4f1b57a28e6a80bdba6d8f6a8004f7ad31ef1602fc6b3be9eb6b97af4e607db85fdbb05a11d28c3d8094e8a320e6a2e12c8a9272206a189f39ee1dcb0a6b5ea51949835c015952b1c400782fd081130ba54d57d397c7f5e1fe929c79fb2d82d98cb46b44b3a4a68c35b5c5d73f0d3935c5968bb11e4a84c7bb9665037f7619d875fe30bd73fd0179d9a5a705866bc6c53c60be7c10156dfd44dfbff86b78253f55c329057a5d2ee9fae0e8d25e73a0b7456a2798623f45a9ba2a8a13b81d25916b2ecac743548038e4cd5f05249cf80080bfb1841fcdfefe85a674dbdff06fadd9a12a5825ec8ab722c619181581f122f9c0c0eb104c687300e3d8624aaa854a2e6eadb4db50fae7f039470964ac8720a22dd2c", &(0x7f0000000080)="e77100fd656f8fa3a14eef97c205916a99e283d39c4b6f850cf0faee475d36ecb2ea70427cfff598a174bb03fc9c6463dc338017dc11194c66a4a3512bdd9ef62e5148624dc0191cf69d12d8c6143d25e20f28ecac8ae7204970750284d3e8f2aab6cc98af182757adde16e9a0743ba8ede8f54928ca19bded2ad4e56e3b51e2305c0730f79ff031aa1d65957155b9db25e3c02a161932b3dbf2ec8f47b01c27280e5422d34c64203ec08fa9a46c863b8e451fa7046563583d36c2839ebb42097b80f10fbb2b06a968e8", 0x1000, 0xca}) 17:44:34 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x170101c000000000, 0x12], [0xc1]}) 17:44:34 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 801.700480][ T8881] device ifb0 entered promiscuous mode [ 801.734682][ T8881] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 801.770667][ T8878] device ifb0 left promiscuous mode 17:44:34 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x500000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 801.827699][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 801.842742][ T8895] kvm [8886]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 801.884255][ T8894] Unknown ioctl -1060088315 17:44:34 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x4000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:34 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x100, 0x20003) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x399, 0x40000) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000100)={0x7f, 0xa8}) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f00000000c0)={0x0, 0x9, 0x7fff}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) [ 802.037170][ T8892] device ifb0 entered promiscuous mode [ 802.068596][ T8881] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:44:34 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x600000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:35 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x8000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 802.237186][ T8915] __ntfs_error: 53 callbacks suppressed [ 802.237194][ T8915] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 802.277882][ T8915] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 802.318215][ T8915] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. 17:44:35 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x8200000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:35 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 802.452056][ T8913] device ifb0 left promiscuous mode 17:44:35 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0xe00}) [ 802.610549][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 802.647132][ T8897] Unknown ioctl -1060088315 [ 802.652348][ T8931] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 802.665018][ T8936] device ifb0 entered promiscuous mode [ 802.678289][ T8936] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 802.685801][ T8931] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 802.708031][ T8936] device ifb0 left promiscuous mode [ 802.727059][ T8931] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. 17:44:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x7ff, 0x200040) sendmsg$IPVS_CMD_DEL_SERVICE(r2, 0x0, 0x40) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000000c0)={r0}) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'trusted.', 'illinois\x00'}, &(0x7f0000000080)=""/27, 0x1b) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:44:35 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x1b00000000000000, 0x12], [0xc1]}) 17:44:35 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:35 executing program 4: sysfs$1(0x1, &(0x7f0000000000)='ifb0\x00\x03\x00`\\\x00\x00\x00l\x00') r0 = accept4(0xffffffffffffff9c, &(0x7f0000000040)=@hci, &(0x7f00000000c0)=0x80, 0x80000) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, &(0x7f0000000380)=""/4096, &(0x7f0000000100)=0x1000) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000180)={0x7, 0x2, 0x2, 0x7}, 0x10) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) [ 802.849359][ T8931] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 802.917254][ T8931] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 802.936524][ T8951] kvm [8944]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 802.956281][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:35 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:35 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x41, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x2000, 0x0) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f00000003c0)={0x3, r2}) sendfile(r0, r0, &(0x7f0000000000), 0x7) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) r3 = syz_open_dev$vbi(&(0x7f0000000440)='/dev/vbi#\x00', 0x0, 0x2) setsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000080)={0x7, 0xef6, 0xffffffffffffff7f, 0xefa}, 0x8) getresuid(&(0x7f0000000140), &(0x7f0000000180)=0x0, &(0x7f00000001c0)) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm-control\x00', 0x7fff, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, r4}}, {@privport='privport'}], [{@fsuuid={'fsuuid', 0x3d, {[0x66, 0x36, 0x0, 0x73, 0x36, 0x3b, 0x3f, 0x33], 0x2d, [0x75, 0x0, 0x0, 0x37], 0x2d, [0x66, 0x34, 0x62, 0x7f], 0x2d, [0x63, 0x73, 0x77, 0x37], 0x2d, [0x76, 0x62, 0x64, 0x33, 0x31, 0x3f, 0x31]}}}, {@smackfshat={'smackfshat', 0x3d, '/dev/vbi#\x00'}}, {@obj_user={'obj_user'}}, {@fsmagic={'fsmagic', 0x3d, 0x100}}, {@obj_type={'obj_type', 0x3d, '/dev/vbi#\x00'}}, {@hash='hash'}, {@smackfsfloor={'smackfsfloor', 0x3d, 'trustedsecurity'}}, {@smackfsdef={'smackfsdef', 0x3d, 'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}}]}}) [ 803.005448][ T8936] device ifb0 entered promiscuous mode [ 803.031079][ T8931] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. [ 803.063649][ T8936] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 803.110639][ T8956] device ifb0 left promiscuous mode 17:44:35 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x800000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:35 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:36 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 803.336642][ T8972] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. 17:44:36 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x1b0001c000000000, 0x12], [0xc1]}) 17:44:36 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x1100}) 17:44:36 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ip6_vti0\x00'}) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x80000) mq_timedreceive(r1, &(0x7f0000000380)=""/4096, 0x1000, 0x2, &(0x7f0000000080)={0x0, 0x1c9c380}) r2 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000000c0)=r2, 0x4) [ 803.540937][ T8983] device ifb0 entered promiscuous mode [ 803.557462][ T8983] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 803.670322][ T8993] kvm [8979]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 803.735857][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 803.841247][ T8983] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:44:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r2 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, 0x0, 0xfffffffffffffeca) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x1) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(r2, 0x0, 0x10081) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x3ffffc) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x1c, r3, 0xd73e0d57fa94c720, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x80) shutdown(r1, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x40000) sendto$inet6(r4, &(0x7f0000000080), 0x233, 0x10, 0x0, 0xfffffffffffffe64) ioctl$VIDIOC_ENUMINPUT(r2, 0xc050561a, &(0x7f0000000000)={0x0, "67aa11357c590e3127349f3361c41d26c06abc0c728f278d61ddefa00aeca56f", 0x2, 0x6, 0x4, 0x20b010, 0x20, 0xa}) 17:44:36 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x500000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:36 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) 17:44:36 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x900000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:36 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x1e01000000000000, 0x12], [0xc1]}) 17:44:36 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x600000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:36 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xa00000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 804.016247][ T9013] kvm [9002]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 804.044223][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:36 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 804.208290][ T9008] device ifb0 left promiscuous mode 17:44:37 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x1200}) 17:44:37 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x800000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:37 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x1, 0x4, 0x9, 0xac3b, 0x1, 0x9, 0x3f, 0x9, 0x5, 0x76c5, 0x7fffffff, 0xe22, 0x6, 0xffffffffffffffc1, 0x10000], 0x1000, 0x8000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) 17:44:37 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x1f0001c000000000, 0x12], [0xc1]}) [ 804.442041][ T9037] kvm [9032]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 804.458175][ T9039] device ifb0 entered promiscuous mode [ 804.501061][ T9039] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 804.509835][ T9040] device ifb0 left promiscuous mode 17:44:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:44:37 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xb00000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:37 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x900000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:37 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x2000}) 17:44:37 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = accept$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x14) sendto(r0, &(0x7f0000000000)="025379077fa913da008beac32a9800a8f0", 0x11, 0x8080, &(0x7f00000000c0)=@can={0x1d, r2}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000140)={'veth0_to_bridge\x00'}) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000180), &(0x7f0000000200)=0x68) 17:44:37 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x2000000000000000, 0x12], [0xc1]}) [ 804.906060][ T9065] device ifb0 entered promiscuous mode 17:44:37 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xa00000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 804.947852][ T9065] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 804.972196][ T9070] kvm [9062]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 804.977537][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 804.994910][ T9077] device ifb0 left promiscuous mode 17:44:37 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xc00000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:37 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xb00000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:37 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xc00000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:38 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xd00000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:38 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xd00000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 805.463403][ T9065] device ifb0 entered promiscuous mode [ 805.492652][ T9065] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 805.558820][ T9077] device ifb0 left promiscuous mode 17:44:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) r2 = socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) ioctl$KVM_GET_DEVICE_ATTR(r2, 0x4018aee2, &(0x7f0000000040)={0x0, 0x7f, 0x200, &(0x7f0000000000)=0x8}) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:44:38 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xe00000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:38 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x200001c000000000, 0x12], [0xc1]}) 17:44:38 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x181100, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, &(0x7f0000000100)={0x6, &(0x7f0000000040)=[{0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @local}, {0x0, 0x0, 0x0, @local}, {0x0, 0x0, 0x0, @local}]}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) 17:44:38 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xe00000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:38 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x2500}) 17:44:38 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x20002, 0x0) ioctl$void(r0, 0x0) statx(r1, &(0x7f0000000040)='./file0\x00', 0x4000, 0xfff, &(0x7f0000000080)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) 17:44:38 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 805.866941][ T9130] kvm [9122]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 805.870385][ T9129] device ifb0 entered promiscuous mode [ 805.893390][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 805.906660][ T9129] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:44:38 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xfffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:38 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1000000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:38 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 806.303382][ T9141] device ifb0 left promiscuous mode 17:44:39 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x221001c000000000, 0x12], [0xc1]}) [ 806.344088][ T9156] device ifb0 entered promiscuous mode [ 806.417446][ T9129] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 806.466244][ T9163] kvm [9162]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:44:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) r2 = socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r3 = accept(0xffffffffffffffff, 0x0, 0x0) r4 = shmget(0x0, 0x1000, 0x4, &(0x7f0000ffd000/0x1000)=nil) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@empty, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@mcast2}}, &(0x7f0000000180)=0xe8) getgroups(0x2, &(0x7f0000000200)=[0xee01, 0xee01]) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000380)=0x0) r10 = getpid() shmctl$IPC_SET(r4, 0x1, &(0x7f00000003c0)={{0x1, r5, r6, r7, r8, 0x100, 0xfff}, 0x2, 0x7, 0x8, 0x3ad, r9, r10, 0x3f}) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(r3, 0x0, 0xffffffffffffff95) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0xa5) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r11 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r11, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:44:39 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1100000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:39 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x3f00}) 17:44:39 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x80, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x6, &(0x7f00000002c0)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xee00, 0xee00]) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000580)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000006c0)=0xe8) r7 = getgid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000700)=0x0) getresuid(&(0x7f0000000740)=0x0, &(0x7f0000000780), &(0x7f00000007c0)) getresgid(&(0x7f0000000800), &(0x7f0000000840), &(0x7f0000000880)=0x0) fcntl$getownex(r0, 0x10, &(0x7f00000008c0)={0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000900)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000a00)=0xe8) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r1, &(0x7f0000000bc0)=[{&(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f00000000c0)="f45476c75abdea53e87e2294c3c01d8f5a77c911392ffc373a9ddab78627c34a0844fd92d1774e03b89d18eee6e04dba584dbfd7e08847818bd23e60baceb72989ac0080523ac9aefe59634ea2b9e48815da93ef99064f2f8fadd7dec773e8aaa2e75e89", 0x64}], 0x1, &(0x7f0000000300)=[@rights={{0x18, 0x1, 0x1, [r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r2, r3, r4}}}], 0x38, 0x1}, {&(0x7f0000000380)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000000540)=[{&(0x7f0000000400)="edfe6a2792dd7b9a82464261edb70452f94f87802ffc6d9efb8d78945a30518d88cd234d8f61c955812ec3752f748c16fc0f28a84d125054d2b3c4612cf03a6b8ea9fd0988a772970a029905fc01665e31b191c09ef31de7e6239ba9c4c87c807a70", 0x62}, {&(0x7f0000000480)="33b1f5cf2e07207bc11d1f0a362db011e8f04dbcd3c6e3f4dde8a294e8ca8be46b", 0x21}, {&(0x7f00000004c0)="4389e2899ef2568ad45a07ac75aeec542828d727197415a266181a8dcb5fe837df33aba3e64a4af59efb70e75ea8a8103698300e0f840c00dce7cf11a5664e13e86f79876c455b6e0193", 0x4a}], 0x3, &(0x7f0000000b00)=[@rights={{0x18, 0x1, 0x1, [r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, r6, r7}}}, @cred={{0x1c, 0x1, 0x2, {r8, r9, r10}}}, @cred={{0x1c, 0x1, 0x2, {r11, r12, r13}}}, @rights={{0x18, 0x1, 0x1, [r0, r0]}}], 0x90, 0x24000880}], 0x2, 0x0) 17:44:39 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1100000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:39 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x2500000000000000, 0x12], [0xc1]}) [ 806.658914][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 806.736143][ T9181] device ifb0 left promiscuous mode 17:44:39 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1200000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 806.789263][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 806.821367][ T9193] kvm [9180]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:44:39 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1f00000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:39 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1200000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 806.993118][ T9177] device ifb0 entered promiscuous mode [ 807.010796][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:44:39 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x2000000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:39 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x2010000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:40 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x2500000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 807.330005][ T9192] device ifb0 left promiscuous mode [ 807.351181][ T9177] device ifb0 entered promiscuous mode [ 807.376103][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 807.586549][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:40 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x1, 0x402701) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x1c, r3, 0x20, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) socket$inet6(0xa, 0x1, 0x4) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:44:40 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1f00000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:40 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x260f000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:40 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x2a1001c000000000, 0x12], [0xc1]}) 17:44:40 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'erspan0\x00', &(0x7f0000000000)=@ethtool_rx_ntuple={0x35, {0xc, @udp_ip4_spec={@loopback, @dev={0xac, 0x14, 0x14, 0x1c}, 0x4e23, 0x4e22, 0x7}, @esp_ip4_spec={@empty, @rand_addr=0xb5a, 0x1ff}, 0x5, 0x100, 0x1c9, 0x9, 0xfffffffffffffffe}}}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) 17:44:40 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x4000}) [ 807.711153][ T9242] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:44:40 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x2a01000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 807.758962][ T9239] device ifb0 left promiscuous mode [ 807.794438][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 807.794732][ T9244] kvm [9241]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 807.828572][ T9248] __ntfs_error: 59 callbacks suppressed [ 807.828583][ T9248] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 807.932792][ T9248] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 17:44:40 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3f00000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 807.980425][ T9248] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. [ 808.025375][ T9242] device ifb0 entered promiscuous mode [ 808.032918][ T9242] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:44:40 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x2c1001c000000000, 0x12], [0xc1]}) [ 808.072843][ T9250] device ifb0 left promiscuous mode [ 808.079913][ T9248] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. 17:44:40 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 808.144910][ T9248] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 808.227980][ T9248] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. 17:44:41 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2000000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 808.303548][ T9276] kvm [9270]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:44:41 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x4800000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 808.422128][ T9278] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 808.499544][ T9278] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 808.543148][ T9278] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. [ 808.591965][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r2 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(r2, 0x0, 0x0) r3 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x1000, 0x2000) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r3, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="8c86f0ffbc65a147d84964413be31707aaef0ecfd099c2f84e1c53331d70c947758a7a0969323ebbc21cb8a90d17a3221439770c3ae02d6ef59ee7789355c8d0924e0ae3edc565fdd4b03eca5fb793f077acd579fc4d80094fafc1853150c761289bfd4872ce80c4", @ANYRES16=r4, @ANYBLOB="220725bd7000fedbdf2508000000780004001400010062726f6164636173742d6c696e6b00001400010062726f6164636173742d6c696e6b00003c0007000800040008000000080004000c0000000800030007000000080004001f00000008000300860d000008000200ff0000000800040005000000040007000c00010073797a3000000000"], 0x8c}, 0x1, 0x0, 0x0, 0x800}, 0x10) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r5 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:44:41 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getsockopt$sock_int(r0, 0x1, 0x27, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x200000, 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f00000000c0)=0xfffffffffffffff7) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) 17:44:41 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x4b01000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:41 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x4800}) 17:44:41 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x3400000000000000, 0x12], [0xc1]}) 17:44:41 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2010000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:41 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$inet(r0, &(0x7f0000000480)={&(0x7f0000000000)={0x2, 0x4e23, @rand_addr=0x400}, 0x10, &(0x7f0000000300)=[{&(0x7f00000003c0)="c2a5b4347d41e69dfb8ab66af525b4642e8011453e53da421a639a6ffbf5b91be8163777bbd9408585e471a2147bcd5cf07d86226428d0fb6c22539bb88317c0a22694834e3886629a0eff1fe797b00fc7114fe8e5687b2cb7bdc9c4108b1c09efd987ad9978aa532dd985aeeed2068c2f1e8b0a38aaa2bab461220369c208b5f6d2ad57314e1a1d207d5b563ddcc29c1b", 0x3ce}, {&(0x7f0000000100)="da4072df216ad92c424c9000ffa823fad2846869c9c7e4a8fc8734d77c6e606642f8ff709a6a262b47491941cef34a1c63e9432200ad4ad4cb36dcc192dc59794240da185e86b19e070026ad726e4a78a62ec851d037cb302294054f5c4566f8dbae0f265ac4d7676fcffcc84d319d045b096347710299d9ff2071d9", 0x7c}, {&(0x7f0000000180)="936829e4cde8457f5565660d130dd79147de6e61e9c727637656cb065e81362920e63560adcae0537336dbde8ef0a124ef12015af9b5299e8ba8c9f282aa28a57d069d9157357cee4a405c2c2ad1ddc0f5eb49bb6bdd7c16d71fa14a2c372c5ec1e65eaa8bded09ade825ceeeb73c59fcff8568cca817606cefaae5571501de28f603b0fc87b31cb5e1876514fde01e75c2ba4e05b3f7ae3bcb88b64ae95898d712af6fddf027a4b8e1dab3bb8e04064a91b45a80e984e4d670300d24df499ab04dc50b933f589c7d90606884496e1f324bcadd42df47b9f55e1f5af7a", 0xdd}, {&(0x7f0000000280)="6db41fbd1c1bd47a60e2bd80072b47f9de82b58d8f17d67c2f948d0159633be6fdf2be694b744f1ecf6a2ae82ea0b2b7dc1b5257f7200e7e6c973b2dea7a3689f5a66e9dcefa5df61bc2887a23d7ccd3562b40ff46f02710a46fb65ab4275f5c23bfed3a8ce1ebe6e370f5c05b", 0x7d}], 0x4}, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) 17:44:41 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x4c00000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 808.774308][ T9301] device ifb0 entered promiscuous mode [ 808.801949][ T9301] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 808.832380][ T9302] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 808.849229][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 808.865167][ T9314] kvm [9294]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 808.890019][ T9310] device ifb0 left promiscuous mode 17:44:41 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2500000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:41 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x5001000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:41 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x5a02000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:41 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x260f000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 809.306932][ T9301] device ifb0 entered promiscuous mode [ 809.322928][ T9301] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 809.388287][ T9312] device ifb0 left promiscuous mode [ 809.600412][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:42 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) r2 = socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r3 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r2, 0x402c5342, &(0x7f0000000080)={0x6, 0xb7ff, 0x8, {0x0, 0x989680}, 0x0, 0x400}) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000000)={{0xa, 0x4e24, 0x10000, @dev={0xfe, 0x80, [], 0x2b}, 0x6}, {0xa, 0x4e22, 0x100000001, @empty, 0x89}, 0x1ff, [0x3, 0x9, 0x4, 0x100000000, 0x2, 0x4, 0x3, 0xffffffffffffff87]}, 0x5c) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockopt(r1, 0x100000001, 0x8, &(0x7f0000000200)=""/131, &(0x7f0000000180)=0x83) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(r3, 0x107, 0x2, 0x0, 0x100b9) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:44:42 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x5c00000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:42 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x3a00000000000000, 0x12], [0xc1]}) 17:44:42 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2801000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:42 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x4c00}) 17:44:42 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x1, 0x2) fsetxattr$security_smack_entry(r0, &(0x7f0000000280)='security.SMACK64\x00', &(0x7f00000002c0)='ppp1*posix_acl_access]wlan0\x00', 0x1c, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e24, @multicast2}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20\x00', 0x402, 0x0) writev(r2, &(0x7f0000000280), 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000040), 0x4) ioctl$VIDIOC_DV_TIMINGS_CAP(r3, 0xc0905664, &(0x7f0000000080)={0x0, 0x0, [], @bt={0x7ff, 0x8, 0x2, 0x3, 0x1, 0x8, 0x10, 0x9}}) fsetxattr$security_smack_entry(r0, &(0x7f0000000180)='security.SMACK64IPIN\x00', &(0x7f0000000300)='ppp1*posix_acl_access]wlan0\x00', 0x1c, 0x0) [ 809.746538][ T9351] device ifb0 entered promiscuous mode 17:44:42 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6800000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 809.788160][ T9351] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 809.812674][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 809.829850][ T9356] device ifb0 left promiscuous mode [ 809.850062][ T9366] kvm [9349]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:44:42 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2901000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:42 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6c00000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:42 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7001000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:42 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x5c00}) 17:44:42 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2a01000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 810.276411][ T9387] device ifb0 entered promiscuous mode [ 810.319325][ T9387] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 810.340732][ T9393] device ifb0 left promiscuous mode [ 810.506877][ T9387] device ifb0 entered promiscuous mode [ 810.513208][ T9387] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 810.527419][ T9393] device ifb0 left promiscuous mode [ 810.607939][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:43 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r2 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(r2, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:44:43 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) shutdown(r0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x1, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) prctl$PR_SET_FPEXC(0xc, 0x0) 17:44:43 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x3b00000000000000, 0x12], [0xc1]}) 17:44:43 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7400000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:43 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3f00000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:43 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x6000}) 17:44:43 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7a00000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 810.805186][ T9417] kvm [9410]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 810.816441][ T9421] device ifb0 entered promiscuous mode [ 810.838700][ T9421] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 810.878118][ T9423] device ifb0 left promiscuous mode 17:44:43 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:43 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:43 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x97ffffff00000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:43 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x4800000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 811.195948][ T9421] device ifb0 entered promiscuous mode [ 811.215878][ T9421] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:44:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x4000000000000000, 0x12], [0xc1]}) [ 811.253495][ T9427] device ifb0 left promiscuous mode [ 811.393867][ T9456] kvm [9452]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:44:44 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuacct.usage_sys\x00', 0x0, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/qat_adf_ctl\x00', 0x40, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, 0x0, 0x321) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) r3 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000240), 0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={'crct10dif_(\x00'}}) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$getownex(r3, 0x10, &(0x7f00000000c0)={0x0, 0x0}) rt_tgsigqueueinfo(r4, r5, 0x15, &(0x7f0000000280)={0x22, 0xa236, 0x81}) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r6 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:44:44 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xebffffff00000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:44 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x4c00000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:44 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = semget(0x1, 0x4, 0x4) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x40, 0x0) write$FUSE_DIRENT(r2, &(0x7f0000000080)={0xf0, 0x0, 0x6, [{0x6, 0x3, 0x0, 0x20200}, {0x1, 0x4, 0x3, 0x1, 'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}, {0x2, 0xc18, 0xe, 0x8, 'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}, {0x6, 0x3, 0xe, 0x382, 'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}, {0x5, 0x200, 0xe, 0x1000, 'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}, {0x2, 0x8, 0xc, 0x7, 'cpusetvmnet0'}]}, 0xf0) semctl$SETVAL(r1, 0x6, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) 17:44:44 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x6800}) 17:44:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x4001000000000000, 0x12], [0xc1]}) [ 811.739524][ T9474] device ifb0 entered promiscuous mode 17:44:44 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5c00000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:44 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xf003000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 811.798100][ T9474] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 811.813453][ C1] net_ratelimit: 1 callbacks suppressed [ 811.813463][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 811.834243][ T9487] kvm [9475]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 811.855758][ T9479] device ifb0 left promiscuous mode 17:44:44 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xf203000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 812.020065][ T9486] could not allocate digest TFM handle crct10dif_( 17:44:44 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6800000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:44 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 812.122188][ T9474] device ifb0 entered promiscuous mode [ 812.148185][ T9474] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 812.176790][ T9487] kvm [9475]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 812.211770][ T9509] device ifb0 left promiscuous mode 17:44:44 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x6c00}) [ 812.443012][ T9521] device ifb0 entered promiscuous mode [ 812.478193][ T9521] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 812.490339][ T9523] device ifb0 left promiscuous mode [ 812.602179][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 812.676877][ T9499] could not allocate digest TFM handle crct10dif_( [ 812.684015][ T9521] device ifb0 entered promiscuous mode [ 812.690971][ T9521] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 812.698705][ T9523] device ifb0 left promiscuous mode 17:44:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000000)={0x7, 0xffffffffffffffe0, 0x7fff, 0xfffffffffffff128, 0x7}) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) r2 = fsopen(&(0x7f0000000000)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x6, 0x0, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") fsmount(r2, 0x0, 0x400000000000010) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) 17:44:45 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xf9fdffff00000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:45 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6c00000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:45 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x400101c000000000, 0x12], [0xc1]}) 17:44:45 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x80000, 0x10) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000040)=0x7f) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) 17:44:45 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfa03000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 812.837166][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 812.859318][ T9548] kvm [9540]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 812.898904][ T9543] __ntfs_error: 62 callbacks suppressed [ 812.898925][ T9543] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 812.933221][ T9543] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 812.946851][ T9543] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. 17:44:45 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfb03000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:45 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x7400}) 17:44:45 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x410101c000000000, 0x12], [0xc1]}) 17:44:45 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x7400000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:45 executing program 4: r0 = dup(0xffffffffffffff9c) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000040)={@empty}, &(0x7f0000000080)=0x14) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 17:44:45 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfc01000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 813.145618][ T9567] device ifb0 entered promiscuous mode [ 813.160041][ T9567] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 813.211800][ T9575] kvm [9564]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 813.234291][ T9577] device ifb0 left promiscuous mode [ 813.239177][ T9573] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 813.293895][ T9573] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 813.314795][ T9573] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. [ 813.395849][ T9573] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 813.417806][ T9573] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 813.438958][ T9573] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. [ 813.460759][ T9567] device ifb0 entered promiscuous mode [ 813.466650][ T9567] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 813.505718][ T9577] device ifb0 left promiscuous mode 17:44:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e1e, 0x0, @rand_addr, 0xffffffffffffffff}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x8000000) r2 = socket$kcm(0x29, 0x0, 0x0) r3 = shmget(0x3, 0x1000, 0x540015a6, &(0x7f0000ffe000/0x1000)=nil) shmctl$IPC_RMID(r3, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r4 = accept(r1, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x800) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$IMGETDEVINFO(r4, 0x80044944, &(0x7f0000000080)={0x8000}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r4, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(r4, 0x107, 0x2, 0x0, 0x30b) socket$inet6(0xa, 0x6, 0x5aa) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, 0x0, 0x0) shutdown(r1, 0x1) r5 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:44:46 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x4800000000000000, 0x12], [0xc1]}) 17:44:46 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x7a00}) 17:44:46 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x24040, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000000c0)={0x1, 0x0, 0x200, 0xbe, 0x0}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x8, 0x5, 0x202, 0x1, 0x4, 0x3ff, 0x0, 0x3, r1}, &(0x7f0000000180)=0x20) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x200, 0x0) ioctl$TUNSETSNDBUF(r3, 0x400454d4, &(0x7f0000000040)=0x10000) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) 17:44:46 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfc03000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:46 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x7a00000000000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:46 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfd03000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 813.707341][ T9598] device ifb0 entered promiscuous mode [ 813.724680][ T9598] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 813.744688][ T9596] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. 17:44:46 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000000)={{0xa, 0x4e21, 0x81, @dev={0xfe, 0x80, [], 0x19}, 0x2}, {0xa, 0x4e21, 0xfffffffffffff6b2, @loopback, 0x1}, 0xffffffffffffffe0, [0xfffffffffffffffd, 0x4b, 0x40, 0x5, 0xef3d, 0x4, 0x99, 0x400]}, 0x5c) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) r1 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0xaa, 0x40080) recvmsg$kcm(r1, &(0x7f0000000480)={&(0x7f00000000c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000140)=""/207, 0xcf}, {&(0x7f0000000240)=""/250, 0xfa}], 0x2, &(0x7f00000003c0)=""/162, 0xa2}, 0x41) 17:44:46 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 813.792732][ T9608] kvm [9591]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:44:46 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfdfdffff00000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 813.860009][ T9609] device ifb0 left promiscuous mode 17:44:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000000)=[@sack_perm, @timestamp, @timestamp], 0x3) 17:44:46 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfdffffff00000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 813.998527][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:46 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x97ffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 814.171373][ T9598] device ifb0 entered promiscuous mode [ 814.203046][ T9598] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 814.242371][ T9609] device ifb0 left promiscuous mode 17:44:47 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x1000000}) 17:44:47 executing program 4: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x3ab1, 0x200041) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000040)=@assoc_value={0x0, 0xffffffff}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000000c0)={r1, 0x9, 0x7fffffff, 0x3}, 0x10) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) 17:44:47 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfe03000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:47 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x4900000000000000, 0x12], [0xc1]}) 17:44:47 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xe0ffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:47 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xff03000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:47 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) r1 = dup(r0) write$UHID_DESTROY(r1, &(0x7f0000000040), 0x1a5) [ 814.543778][ T9656] kvm [9654]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 814.568392][ T9663] device ifb0 entered promiscuous mode [ 814.586989][ T9663] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 814.635494][ T9663] device ifb0 left promiscuous mode 17:44:47 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xffffff7f00000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:47 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xebffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 814.791555][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:44:47 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x4c00000000000000, 0x12], [0xc1]}) 17:44:47 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 814.961341][ T9691] kvm [9685]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 814.985760][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 815.012954][ T9663] device ifb0 entered promiscuous mode [ 815.037124][ T9663] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 815.110539][ T9693] device ifb0 left promiscuous mode 17:44:48 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x2000000}) 17:44:48 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:48 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff0f, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:48 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x4000, 0x0) ioctl$TIOCGICOUNT(r1, 0x545d, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) r2 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x3, 0x802) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000080)={0x6, 0x0, 0x10003, 0xf6}) ioctl$DRM_IOCTL_AGP_UNBIND(r2, 0x40106437, &(0x7f00000000c0)={r3, 0x3}) 17:44:48 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x580001c000000000, 0x12], [0xc1]}) 17:44:48 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:48 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'i&j0\x00\x01\x00'}) [ 815.384576][ T9709] kvm [9706]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 815.421106][ T9716] device ifb0 entered promiscuous mode 17:44:48 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xf9fdffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 815.478298][ T9716] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 815.503144][ T9716] device ifb0 left promiscuous mode 17:44:48 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 815.717054][ T9716] device ifb0 entered promiscuous mode [ 815.765189][ T9716] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 815.797363][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 815.816341][ T9741] device ifb0 left promiscuous mode 17:44:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r2 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(r2, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:44:48 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x5c00000000000000, 0x12], [0xc1]}) 17:44:48 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x3, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 816.020400][ T9754] kvm [9750]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:44:48 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x3000000}) 17:44:48 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xfdfdffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:48 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) [ 816.081497][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:48 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:49 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = dup3(r0, r0, 0x80000) getpeername$netlink(r1, &(0x7f0000000240), &(0x7f0000000280)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x20000, 0x0) ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0xe) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0x8) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000180)={0xdbd}, 0x4) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f00000001c0)=ANY=[@ANYRES32=r3, @ANYBLOB="ba0000000000000000000100"], 0x10) close(r0) fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) ptrace$pokeuser(0x6, r4, 0x100, 0x43cc) ioctl$SIOCX25SFACILITIES(r2, 0x89e3, &(0x7f0000000140)={0x5b, 0x9, 0x9, 0x8, 0x698}) getsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f00000000c0)={r3, 0x1}, &(0x7f0000000100)=0x8) [ 816.251570][ T9779] device ifb0 entered promiscuous mode 17:44:49 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x6000000000000000, 0x12], [0xc1]}) [ 816.294401][ T9779] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 816.313219][ T9783] device ifb0 left promiscuous mode 17:44:49 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xfdffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:49 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x5, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 816.478709][ T9795] kvm [9789]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 816.661542][ T9779] device ifb0 entered promiscuous mode 17:44:49 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x4900, 0x4) connect$netlink(r0, &(0x7f0000000180)=@proc={0x10, 0x0, 0x25dfdbff, 0x80000}, 0xc) r1 = socket$inet6(0xa, 0x1, 0x400) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x675}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000080)={r2, 0x10001}, 0x8) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x8000, 0x0) ioctl$VIDIOC_DBG_G_CHIP_INFO(r0, 0xc0c85666, &(0x7f00000001c0)={{0x6, @addr=0x1}, "da7210ce39033754e95d0b6dbbabb57352e52007830c2f2318c3ee93d29fcef1", 0x2}) bind$netlink(r4, &(0x7f0000000100)={0x10, 0x0, 0x25dfdbfc, 0x8003000}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) connect(r4, &(0x7f0000000440)=@can={0x1d, r5}, 0x80) [ 816.719105][ T9779] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 816.753441][ T9783] device ifb0 left promiscuous mode [ 816.847006][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r2 = gettid() ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r2, 0x10, &(0x7f0000000000)={0x81}) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000040)="a415ac1a9e98db575ce49cb75bdb67c57bafe9e49cc98edefdfe7fce34d4ad29209019960de8333f6a788a59aef27a3ce6f78d6d32da72176f06e6afbda3c05778ed4c39ec25c6a59c2cf36b5a4e5a3194f2ba2f8cd7682a047a9bdea9dde90882458b9b02532914c828c54c2cdf30158ec0a13c14063d6c", 0x78, 0x10, 0x0, 0x0) 17:44:49 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffff7f00000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:49 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x6005000000000000, 0x12], [0xc1]}) 17:44:49 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x4000000}) 17:44:49 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x6, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:49 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'ifB0\x00\x03\x00`\\\x00\x00\x00l\x00', 0x2}) [ 817.044931][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 817.071600][ T9828] kvm [9822]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:44:49 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:49 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x6105000000000000, 0x12], [0xc1]}) [ 817.201284][ T9846] device ifb0 entered promiscuous mode [ 817.233393][ T9846] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 817.254453][ T9849] device ifb0 left promiscuous mode 17:44:50 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x7, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 817.412859][ T9862] kvm [9851]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 817.459774][ T9846] device ifb0 entered promiscuous mode 17:44:50 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffffffffff0f, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 817.502997][ T9846] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:44:50 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x8, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 817.543724][ T9849] device ifb0 left promiscuous mode 17:44:50 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x6800000000000000, 0x12], [0xc1]}) [ 817.820490][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) r2 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) socket(0xf, 0x800, 0x3) recvmsg(r1, 0x0, 0x0) getsockname$ax25(r2, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:44:50 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x9, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:50 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x5000000}) 17:44:50 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'erspan0\x00', &(0x7f0000000000)=@ethtool_rx_ntuple={0x35, {0xc, @udp_ip4_spec={@loopback, @dev={0xac, 0x14, 0x14, 0x1c}, 0x4e23, 0x4e22, 0x7}, @esp_ip4_spec={@empty, @rand_addr=0xb5a, 0x1ff}, 0x5, 0x100, 0x1c9, 0x9, 0xfffffffffffffffe}}}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\\\x00\x00\x00l\x00'}) 17:44:50 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffe0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 817.946553][ T9893] device ifb0 entered promiscuous mode [ 817.963221][ T9898] __ntfs_error: 88 callbacks suppressed [ 817.963229][ T9898] ntfs: (device loop1): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. 17:44:50 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x6c00000000000000, 0x12], [0xc1]}) [ 817.999049][ T9900] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 818.008873][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 818.030574][ T9893] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 818.048889][ T9900] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 818.094550][ T9906] device ifb0 left promiscuous mode [ 818.115550][ T9898] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 818.132418][ T9900] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. [ 818.224631][ T9914] kvm [9911]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 818.277486][ T9898] ntfs: (device loop1): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 818.292366][ T9900] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. 17:44:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r2 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$IMGETDEVINFO(r2, 0x80044944, &(0x7f0000000200)={0x2}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) preadv(r0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/187, 0xbb}, {&(0x7f00000000c0)=""/46, 0x2e}], 0x2, 0x0) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) [ 818.327981][ T9893] device ifb0 entered promiscuous mode [ 818.345441][ T9893] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 818.376009][ T9906] device ifb0 left promiscuous mode [ 818.377886][ T9898] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 818.396909][ T9900] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 17:44:51 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xa, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 818.460369][ T9900] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. [ 818.494365][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:51 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:51 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x6000000}) 17:44:51 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x7005000000000000, 0x12], [0xc1]}) 17:44:51 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 818.739014][ T9935] device ifb0 entered promiscuous mode [ 818.773506][ T9935] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:44:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r2 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) r3 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x4004) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) r4 = ioctl$TIOCGPTPEER(0xffffffffffffff9c, 0x5441, 0x3ff) ioctl$PIO_UNISCRNMAP(r4, 0x4b6a, &(0x7f0000000200)="659bece02d4b9d85847d61136c8eabcb21097efba905e4bc7ecd765b6aa558d8d5cf508592c1fcb65318b47d81a37f98ccf561176986ec480f1fb79f370e4dd282a349e1dada3e518998523919b42ca3fd5fab1fda3de90893d753e04638f25717ff6e53d73c3910e5e32dcd9cb532a37acd98955e76532de1912063130d7b236954806c70b86e1166f360c5a2d42a158bb2fabe8368bc1e086a5b19430f99068636a6b809b99e7f6031a1f9324808da2d51d94620bf616b97cc8ea79039136855b3a90742c9018e7a439e1461c6d0") recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(r3, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) getsockname$ax25(r2, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r5 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000000)=0x1f, 0x4) sendto$inet6(r1, &(0x7f0000000040)="541b129bde56326dfd58947d", 0xffffffffffffffe9, 0x10, 0x0, 0x0) [ 818.809314][ T9939] kvm [9936]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 818.830350][ T9941] device ifb0 left promiscuous mode 17:44:51 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xb, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:51 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:51 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x4, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x10800, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000040), &(0x7f0000000080)=0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, 0x0, 0xfffffffb) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r2, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:44:51 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xc, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 819.205290][ T9935] device ifb0 entered promiscuous mode [ 819.216232][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 819.252752][ T9935] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:44:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0xa, 0x0, 0xffffffffffffff0f) 17:44:52 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x5, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:52 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x7000000}) 17:44:52 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x7105000000000000, 0x12], [0xc1]}) 17:44:52 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xd, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:52 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 819.519232][ T9976] kvm [9975]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 819.529675][ T9981] device ifb0 left promiscuous mode [ 819.591695][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:52 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:52 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xe, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:52 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x8, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 819.969546][ T9981] device ifb0 entered promiscuous mode [ 819.988798][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 820.040166][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:44:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x800, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:44:52 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x7205000000000000, 0x12], [0xc1]}) 17:44:52 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 820.214451][T10021] kvm [10020]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 820.304144][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:53 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xc001102c, 0x12], [0xc1]}) 17:44:53 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x9, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:53 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x8000000}) 17:44:53 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x11, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:53 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x7400000000000000, 0x12], [0xc1]}) [ 820.590438][T10048] device ifb0 left promiscuous mode 17:44:53 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xa, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 820.636528][T10052] kvm [10039]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:44:53 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xb, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:53 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x12, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:53 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xc, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 820.920528][T10048] device ifb0 entered promiscuous mode [ 820.967337][T10048] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 821.028655][T10070] device ifb0 left promiscuous mode [ 821.101530][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r2 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(r2, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:44:53 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xc001102c, 0x12], [0xc1]}) 17:44:53 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x25, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:53 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xd, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:53 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x7401000000000000, 0x12], [0xc1]}) 17:44:54 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x9000000}) 17:44:54 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xe, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 821.260102][T10083] kvm [10082]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 821.271697][T10090] kvm [10086]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:44:54 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x48, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:54 executing program 4 (fault-call:27 fault-nth:0): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:44:54 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x10, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 821.409581][T10101] device ifb0 entered promiscuous mode 17:44:54 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x7501000000000000, 0x12], [0xc1]}) [ 821.494012][T10101] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 821.577398][T10104] device ifb0 left promiscuous mode 17:44:54 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x11, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 821.608193][T10120] FAULT_INJECTION: forcing a failure. [ 821.608193][T10120] name failslab, interval 1, probability 0, space 0, times 0 [ 821.648105][T10122] kvm [10115]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 821.649094][T10120] CPU: 1 PID: 10120 Comm: syz-executor.4 Not tainted 5.2.0-rc5+ #5 [ 821.664910][T10120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 821.674993][T10120] Call Trace: [ 821.678311][T10120] dump_stack+0x1d8/0x2f8 [ 821.682668][T10120] should_fail+0x608/0x860 [ 821.687106][T10120] ? setup_fault_attr+0x2b0/0x2b0 [ 821.692152][T10120] __should_failslab+0x11a/0x160 [ 821.697106][T10120] should_failslab+0x9/0x20 [ 821.701612][T10120] kmem_cache_alloc_node+0x65/0x270 [ 821.706819][T10120] ? __alloc_skb+0x9f/0x500 [ 821.711335][T10120] __alloc_skb+0x9f/0x500 [ 821.715678][T10120] ? ip6_mtu+0x2df/0x380 [ 821.719938][T10120] sk_stream_alloc_skb+0x419/0xa60 [ 821.725255][T10120] tcp_sendmsg_locked+0x1005/0x4250 [ 821.730493][T10120] ? kasan_check_write+0x14/0x20 [ 821.735467][T10120] ? tcp_free_fastopen_req+0x80/0x80 [ 821.740765][T10120] ? local_bh_enable+0x9/0x30 [ 821.745451][T10120] ? trace_hardirqs_on+0x74/0x80 [ 821.750448][T10120] ? __local_bh_enable_ip+0x13a/0x240 [ 821.755817][T10120] ? local_bh_enable+0x1f/0x30 [ 821.760598][T10120] ? lock_sock_nested+0xd6/0x120 [ 821.765696][T10120] tcp_sendmsg+0x2f/0x50 [ 821.769918][T10120] inet_sendmsg+0x147/0x310 [ 821.774406][T10120] ? security_socket_sendmsg+0xa0/0xd0 [ 821.779862][T10120] ? inet_getname+0x3b0/0x3b0 [ 821.784534][T10120] __sys_sendto+0x4ad/0x680 [ 821.789019][T10120] ? __ia32_sys_getpeername+0x90/0x90 [ 821.794373][T10120] ? __mutex_unlock_slowpath+0x18c/0x630 [ 821.799992][T10120] ? mutex_unlock+0x10/0x10 [ 821.804479][T10120] ? __sb_end_write+0xde/0x120 [ 821.809234][T10120] ? kasan_check_write+0x14/0x20 [ 821.814194][T10120] ? fput_many+0x47/0x1a0 [ 821.818523][T10120] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 821.824584][T10120] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 821.830198][T10120] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 821.835684][T10120] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 821.841413][T10120] __x64_sys_sendto+0xe5/0x100 [ 821.846165][T10120] do_syscall_64+0xfe/0x140 [ 821.850682][T10120] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 821.856557][T10120] RIP: 0033:0x4592c9 [ 821.860439][T10120] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 821.880061][T10120] RSP: 002b:00007fc94a019c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 821.888463][T10120] RAX: ffffffffffffffda RBX: 00007fc94a019c90 RCX: 00000000004592c9 [ 821.896420][T10120] RDX: 00000000fffffdda RSI: 00000000200000c0 RDI: 0000000000000005 [ 821.904373][T10120] RBP: 000000000075bfc8 R08: 0000000000000000 R09: ffffffffffffff0f [ 821.912348][T10120] R10: 0000000000000010 R11: 0000000000000246 R12: 00007fc94a01a6d4 [ 821.920298][T10120] R13: 00000000004c707f R14: 00000000004dc260 R15: 0000000000000006 [ 822.145468][T10101] device ifb0 entered promiscuous mode [ 822.152986][ C0] net_ratelimit: 2 callbacks suppressed [ 822.152995][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 822.173971][T10101] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:44:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r2 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000000)={0x0, 0x8001, 0x1, [0x100]}, &(0x7f0000000040)=0xa) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000200)={r3, 0xa9, "989eb0ca166d099afaf7734b867e9817e0547d9d7922c40d3066137131291cd6318cebc4c27e3d80fc45ab86d05fc5135d6d8f10af0a71177642a0945b2b945d22574eb16d4ba9efad8daabf4a16210656568fe1dc3255b578ea7c4b5e595614cbe5adf08408686e59df15b3bf8de919b9b914ffc6820a2903f76d6d76367d4a977c7ad40341f295939b5456d4480a8ae22c4ed6a9662c6b472abedd0b7fefc3fcdfe3928ee5940fa6"}, &(0x7f0000000080)=0xb1) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:44:55 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x4c, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:55 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x12, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 822.240998][T10104] device ifb0 left promiscuous mode 17:44:55 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x25, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:55 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) [ 822.493697][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:55 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0xa000000}) 17:44:55 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x48, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:55 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x5c, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:55 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x7601000000000000, 0x12], [0xc1]}) 17:44:55 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x4c, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 822.706451][T10163] kvm [10162]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 822.776102][T10174] device ifb0 entered promiscuous mode 17:44:55 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x5c, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:55 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x68, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 822.832814][T10174] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 822.899693][T10175] device ifb0 left promiscuous mode 17:44:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x400000, 0x0) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000040)=r2) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r3 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(r3, 0x114, 0x8, 0x0, 0x390fa65a22a58a7e) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(r3, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:44:55 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x68, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:55 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x7702000000000000, 0x12], [0xc1]}) 17:44:55 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x6c, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 823.166213][T10174] device ifb0 entered promiscuous mode [ 823.176224][T10174] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 823.185345][T10175] device ifb0 left promiscuous mode [ 823.295764][T10204] kvm [10194]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:44:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0x7ffff000, 0x10, 0x0, 0xffffffffffffff0f) [ 823.342078][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:56 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0xb000000}) 17:44:56 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6c, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:56 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x74, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:56 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x74, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 823.488752][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 823.590956][T10221] device ifb0 entered promiscuous mode [ 823.638488][T10221] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:44:56 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7a, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:56 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x7900000000000000, 0x12], [0xc1]}) [ 823.712800][T10224] device ifb0 left promiscuous mode 17:44:56 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x7a, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 823.872263][T10238] kvm [10232]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 824.040229][T10221] device ifb0 entered promiscuous mode [ 824.098397][T10221] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 824.138495][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r2 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000040)={0x8, &(0x7f0000000000)=[{0x1, 0x7, 0x9, 0x800}, {0xaf, 0x12073d6b, 0x7, 0x7}, {0x992, 0xff, 0xffff, 0x81}, {0x9, 0x8, 0x2, 0x5}, {0x7fffffff, 0x3, 0x3, 0x7}, {0x6, 0x6, 0x10001, 0x1}, {0x0, 0x80, 0x78c9, 0x10000}, {0x3, 0x3ff, 0x5, 0x1}]}, 0x10) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:44:56 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xe0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:56 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x12a, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:56 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0xc000000}) [ 824.258943][T10259] device ifb0 left promiscuous mode 17:44:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x3, 0x0, 0xffffffffffffff0f) 17:44:57 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x7a00000000000000, 0x12], [0xc1]}) 17:44:57 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x128, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 824.368237][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:57 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x14b, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:57 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x129, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 824.500062][T10277] kvm [10268]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 824.552286][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 824.594939][T10281] __ntfs_error: 44 callbacks suppressed [ 824.594946][T10281] ntfs: (device loop1): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 824.623175][T10259] device ifb0 entered promiscuous mode 17:44:57 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x12a, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 824.685800][T10259] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:44:57 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x7a01000000000000, 0x12], [0xc1]}) [ 824.727942][T10281] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 17:44:57 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0xd000000}) [ 824.856205][T10281] ntfs: (device loop1): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 824.880143][T10301] device ifb0 left promiscuous mode [ 824.903111][T10281] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 824.949272][T10304] kvm [10293]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 825.163912][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:44:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfffffffffffffffe) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x400, 0x0) r3 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x3, 0x2) r4 = socket$nl_generic(0x10, 0x3, 0x10) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x381, 0x0) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(r5, 0x0, 0x40000) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(r0, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(r4, 0x0, 0x8001) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(r2, 0x0, 0xfd41) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r6 = accept4(r2, 0x0, 0x0, 0x0) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:44:58 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x300, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:58 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x150, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:58 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x7b01000000000000, 0x12], [0xc1]}) [ 825.370122][T10321] ntfs: (device loop1): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 825.386448][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 825.418118][T10321] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 17:44:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x8, 0x0, 0xffffffffffffff0f) 17:44:58 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0xe000000}) 17:44:58 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x500, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 825.502092][T10332] device ifb0 entered promiscuous mode [ 825.536432][T10332] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:44:58 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x800000c000000000, 0x12], [0xc1]}) 17:44:58 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x600, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 825.548612][T10321] ntfs: (device loop1): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 825.636482][T10339] device ifb0 left promiscuous mode [ 825.654525][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 825.662469][T10321] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 17:44:58 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x170, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:58 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x700, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 825.718294][T10351] kvm [10344]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:44:58 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x900, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 825.966100][T10332] device ifb0 entered promiscuous mode [ 826.004240][T10346] kvm [10344]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 826.018474][T10332] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 826.081077][T10339] device ifb0 left promiscuous mode 17:44:59 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xa00, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:59 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1fc, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:59 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x8004000000000000, 0x12], [0xc1]}) 17:44:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$KVM_SET_NESTED_STATE(r2, 0x4080aebf, &(0x7f00000018c0)={0x2, 0x0, 0x2080, {0x1f005, 0x10000, 0x2}, [], "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", "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"}) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) [ 826.386248][T10384] kvm [10379]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:44:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0xa, 0x0, 0xffffffffffffff0f) 17:44:59 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x10000000}) 17:44:59 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xb00, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:59 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x25a, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:59 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x8005000000000000, 0x12], [0xc1]}) [ 826.586819][T10399] device ifb0 entered promiscuous mode 17:44:59 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xc00, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 826.640666][T10399] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 826.672893][T10403] ntfs: (device loop1): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 826.708532][T10405] device ifb0 left promiscuous mode [ 826.733893][T10403] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 826.755167][T10414] kvm [10408]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:44:59 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xd00, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:59 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xe00, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:59 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x300, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 827.103541][T10399] device ifb0 entered promiscuous mode 17:44:59 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xf26, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:44:59 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x3f0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 827.158467][T10399] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 827.189354][T10405] device ifb0 left promiscuous mode 17:45:00 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f0000000200)=0x8) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) [ 827.471346][ C0] net_ratelimit: 2 callbacks suppressed [ 827.471356][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 827.514443][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:45:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0xb, 0x0, 0xffffffffffffff0f) 17:45:00 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x810000c000000000, 0x12], [0xc1]}) 17:45:00 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1020, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:00 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x11000000}) 17:45:00 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x3f2, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 827.629044][T10456] device ifb0 entered promiscuous mode [ 827.668007][T10456] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:45:00 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1100, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 827.709796][T10468] kvm [10461]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 827.733301][T10471] device ifb0 left promiscuous mode 17:45:00 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x3fa, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 827.759110][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:45:00 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1200, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:00 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1f00, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:00 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x3fb, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:00 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x12000000}) [ 828.229581][T10499] device ifb0 entered promiscuous mode [ 828.258888][T10499] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 828.292119][T10499] device ifb0 left promiscuous mode 17:45:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) r2 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x144) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r3, 0x80045530, &(0x7f0000000400)=""/199) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xffffffee, 0x12, 0x0, 0xffffffffffffff0f) [ 828.427169][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 828.550434][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:45:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0xc, 0x0, 0xffffffffffffff0f) 17:45:01 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x8104000000000000, 0x12], [0xc1]}) 17:45:01 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x2000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:01 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x3fc, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 828.608891][T10499] device ifb0 entered promiscuous mode [ 828.614720][T10499] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:45:01 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x2010, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 828.707574][T10516] device ifb0 left promiscuous mode [ 828.754254][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 828.783140][T10528] kvm [10518]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:45:01 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x2500, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:01 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x3fd, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:01 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x260f, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:01 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x2801, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:01 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x3fe, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:01 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x20000000}) [ 829.220605][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:45:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r2 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(r2, 0x0, 0xffffffffffffffd7) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) [ 829.360053][T10561] device ifb0 entered promiscuous mode [ 829.366221][T10561] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 829.391589][T10561] device ifb0 left promiscuous mode [ 829.489910][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 829.559050][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:45:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0xe, 0x0, 0xffffffffffffff0f) 17:45:02 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x8105000000000000, 0x12], [0xc1]}) 17:45:02 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x2901, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:02 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x500, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 829.633059][T10561] device ifb0 entered promiscuous mode [ 829.684917][T10583] __ntfs_error: 6 callbacks suppressed [ 829.684926][T10583] ntfs: (device loop1): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 829.686132][T10561] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:45:02 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x2a01, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 829.735704][T10583] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 829.776494][T10586] kvm [10578]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 829.789583][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 829.833561][T10575] device ifb0 left promiscuous mode [ 829.909327][T10583] ntfs: (device loop1): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. 17:45:02 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3f00, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 829.955264][T10583] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 17:45:02 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x600, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:02 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x4000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:02 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x4800, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:02 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x25000000}) [ 830.243971][T10606] ntfs: (device loop1): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. 17:45:03 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x820000c000000000, 0x12], [0xc1]}) [ 830.314169][T10615] device ifb0 entered promiscuous mode 17:45:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r2 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x30}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)={0x21c, r3, 0x0, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x74, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@empty}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@dev={0xfe, 0x80, [], 0x10}}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2f}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x87}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7ff}]}, @IPVS_CMD_ATTR_DAEMON={0x90, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip_vti0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0xb}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xf0}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x1c}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge_slave_1\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x2}}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7b}]}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}]}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6tnl0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}]}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast2}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x7f}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x9}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x25, 0x24}}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x1}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4e9}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xff}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xe21}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}]}, 0x21c}, 0x1, 0x0, 0x0, 0x8041}, 0x20008000) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) [ 830.361042][T10615] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 830.397782][T10606] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 830.422137][T10617] device ifb0 left promiscuous mode [ 830.481184][T10626] kvm [10621]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:45:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0xf, 0x0, 0xffffffffffffff0f) 17:45:03 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x4c00, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:03 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x700, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:03 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x5c00, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 830.705585][T10639] ntfs: (device loop1): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 830.751075][T10639] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 17:45:03 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6800, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 830.807603][T10615] device ifb0 entered promiscuous mode [ 830.845143][T10639] ntfs: (device loop1): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 830.880901][T10639] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 830.901722][T10615] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:45:03 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6c00, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 830.938683][T10617] device ifb0 left promiscuous mode 17:45:03 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x900, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:03 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7400, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:03 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x8204000000000000, 0x12], [0xc1]}) 17:45:03 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x3f000000}) 17:45:03 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xa00, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 831.250329][T10671] device ifb0 entered promiscuous mode [ 831.301528][T10671] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 831.334592][T10674] device ifb0 left promiscuous mode 17:45:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, 0x0, 0x0) r3 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x4800) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) accept4$nfc_llcp(r3, &(0x7f0000000200), &(0x7f00000000c0)=0x60, 0x80800) r4 = accept4(r1, 0x0, 0x0, 0x800) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, &(0x7f0000000000)=0x2, 0x4) r5 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x1f, 0x200800) ioctl$KVM_SET_NESTED_STATE(r5, 0x4080aebf, &(0x7f00000018c0)={0x1, 0x0, 0x2080, {0xd004, 0x6c4007af140df8c9, 0x3}, [], "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", "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"}) [ 831.364988][T10679] kvm [10666]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:45:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x11, 0x0, 0xffffffffffffff0f) 17:45:04 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7a00, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:04 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xb00, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 831.588912][T10671] device ifb0 entered promiscuous mode [ 831.615423][T10671] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:45:04 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xe0ff, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 831.697857][T10674] device ifb0 left promiscuous mode 17:45:04 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x8205000000000000, 0x12], [0xc1]}) 17:45:04 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xc00, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:04 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xedc0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 831.899567][T10710] kvm [10702]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:45:04 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xffe0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:04 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x40000000}) 17:45:04 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xd00, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:04 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x830000c000000000, 0x12], [0xc1]}) [ 832.200086][T10726] device ifb0 entered promiscuous mode [ 832.247640][T10726] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 832.304593][T10730] device ifb0 left promiscuous mode 17:45:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r2 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, 0x0) setsockopt$inet_udp_int(r2, 0x11, 0x0, 0x0, 0xfffffffffffffe65) membarrier(0x24, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r2, 0x0, 0x2d, &(0x7f0000000000)={0x7, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1b}}}}, 0x88) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, 0x0, 0x99) shutdown(r1, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) [ 832.420279][T10739] kvm [10733]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 832.565273][ C1] net_ratelimit: 9 callbacks suppressed [ 832.565283][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 832.571942][T10726] device ifb0 entered promiscuous mode 17:45:05 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x80000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x12, 0x0, 0xffffffffffffff0f) 17:45:05 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xe00, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 832.630436][T10726] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:45:05 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:05 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x8304000000000000, 0x12], [0xc1]}) 17:45:05 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x48000000}) 17:45:05 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x2000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:05 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xf26, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 832.852986][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 832.925545][T10769] kvm [10768]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 832.988006][T10772] device ifb0 left promiscuous mode 17:45:05 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:05 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1020, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:05 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x4000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 833.255226][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:45:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r2 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) getrandom(&(0x7f0000000000)=""/25, 0x19, 0x2) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, 0x0, 0x11b) shutdown(r1, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:45:06 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x5000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 833.407804][T10772] device ifb0 entered promiscuous mode [ 833.444422][T10772] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 833.525193][T10800] device ifb0 left promiscuous mode [ 833.563987][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 833.607022][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:45:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x14, 0x0, 0xffffffffffffff0f) 17:45:06 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x8305000000000000, 0x12], [0xc1]}) 17:45:06 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:06 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1100, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 833.805826][T10826] kvm [10813]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 833.822991][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:45:06 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x4c000000}) 17:45:06 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:06 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1200, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:06 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x8000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:06 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x840000c000000000, 0x12], [0xc1]}) [ 834.071145][T10839] device ifb0 entered promiscuous mode [ 834.126041][T10839] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:45:06 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1f00, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 834.228943][T10846] device ifb0 left promiscuous mode [ 834.277296][T10851] kvm [10847]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:45:07 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:07 executing program 3: r0 = memfd_create(&(0x7f0000000200)='gPLt\x03\x00stedvbo\x04\xec\xff\xff\xff\x00\x00\x00v.\x00\xd0\xe0\xfa@\xab\x06[\x93,\xd9q\x15<\xfdeG\xa5\xca\xa3e\xb9\xaf\x1f\x1e\x8a\xde1\xacN\xa3\x124\xa5@\x1b\xc1\xa9\xfc\xf5\xf8ky\xcf]\x9c\x91R\x9e', 0x5) fstat(r0, &(0x7f0000000040)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r3 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x2, 0x2) sendmsg$IPVS_CMD_DEL_SERVICE(r3, 0x0, 0x4c001) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r4 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(r4, 0x107, 0x2, 0x0, 0x1fe33ad093879391) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r2, 0x201) r5 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) [ 834.527410][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 834.623343][T10839] device ifb0 entered promiscuous mode [ 834.649393][T10839] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:45:07 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x9000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x18, 0x0, 0xffffffffffffff0f) [ 834.679929][T10846] device ifb0 left promiscuous mode 17:45:07 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xa000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:07 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 834.808473][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:45:07 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x5c000000}) 17:45:07 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xb000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:07 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2500, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:07 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x8404000000000000, 0x12], [0xc1]}) 17:45:07 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xc000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:08 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x260f, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 835.243288][T10907] device ifb0 entered promiscuous mode 17:45:08 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xd000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) [ 835.313571][T10907] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 835.331273][T10914] kvm [10906]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 835.402682][T10913] device ifb0 left promiscuous mode 17:45:08 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xe000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 835.569501][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:45:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x22, 0x0, 0xffffffffffffff0f) 17:45:08 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2a01, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:08 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x10000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 835.767626][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 835.779540][T10907] device ifb0 entered promiscuous mode [ 835.830339][T10907] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:45:08 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x60000000}) 17:45:08 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x11000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:08 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x8405000000000000, 0x12], [0xc1]}) 17:45:08 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x3f00, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:08 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x12000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 836.061873][T10961] device ifb0 left promiscuous mode [ 836.063114][T10959] kvm [10956]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:45:08 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x4000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 836.235710][T10972] __ntfs_error: 22 callbacks suppressed [ 836.235722][T10972] ntfs: (device loop1): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. 17:45:09 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1f000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x800000000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:45:09 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x8504000000000000, 0x12], [0xc1]}) [ 836.349617][T10961] device ifb0 entered promiscuous mode [ 836.368205][T10972] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 836.370190][T10961] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 836.447265][T10977] device ifb0 left promiscuous mode [ 836.496206][T10972] ntfs: (device loop1): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 836.514089][T10972] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 17:45:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x24, 0x0, 0xffffffffffffff0f) 17:45:09 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x20000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:09 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x4800, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 836.597280][T10992] kvm [10986]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 836.708949][T11000] ntfs: (device loop1): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 836.748054][T11000] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 17:45:09 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x20100000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:09 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x68000000}) 17:45:09 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x8505000000000000, 0x12], [0xc1]}) 17:45:09 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x25000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 836.859909][T11000] ntfs: (device loop1): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 836.922535][T11016] device ifb0 entered promiscuous mode [ 836.948729][T11000] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 17:45:09 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x4b01, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 836.980061][T11016] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 837.016053][T11023] kvm [11017]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:45:09 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x260f0000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 837.050349][T11021] device ifb0 left promiscuous mode 17:45:09 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x28010000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 837.210864][T11030] ntfs: (device loop1): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. 17:45:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r2 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(r2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:45:10 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x29010000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 837.271574][T11030] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 837.341906][T11016] device ifb0 entered promiscuous mode [ 837.348359][T11016] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:45:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x25, 0x0, 0xffffffffffffff0f) 17:45:10 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x8601000000000000, 0x12], [0xc1]}) 17:45:10 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x4c00, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:10 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x2a010000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:10 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x6c000000}) 17:45:10 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3f000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 837.639520][T11060] kvm [11058]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 837.657405][T11064] device ifb0 left promiscuous mode [ 837.725912][ C0] net_ratelimit: 3 callbacks suppressed [ 837.725923][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:45:10 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x40000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:10 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x5001, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:10 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x48000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:10 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x8604000000000000, 0x12], [0xc1]}) [ 838.049867][T11064] device ifb0 entered promiscuous mode [ 838.064985][T11064] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 838.132539][T11090] device ifb0 left promiscuous mode 17:45:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f00000000c0)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x80000000000000) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r3 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r2, &(0x7f0000000040)=""/31, 0x1f, 0x100, &(0x7f0000001880)={0xa, 0xffffffffffffffff, 0x0, @rand_addr, 0x1}, 0x1c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, 0x0, 0x0) bind$netrom(r3, 0x0, 0x9db296bf) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r2, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:45:11 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x5a02, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 838.280034][T11102] kvm [11095]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 838.562846][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:45:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x26, 0x0, 0xffffffffffffff0f) 17:45:11 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x4c000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:11 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x74000000}) 17:45:11 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x5c00, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:11 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x8605000000000000, 0x12], [0xc1]}) 17:45:11 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x5c000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 838.688407][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 838.689163][T11130] device ifb0 entered promiscuous mode [ 838.703013][T11124] kvm [11123]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 838.752324][T11130] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:45:11 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x68000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 838.837127][T11135] device ifb0 left promiscuous mode 17:45:11 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x6800, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:11 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6c000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:11 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x6c00, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) r2 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) lseek(r2, 0x0, 0x0) shutdown(r1, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:45:11 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x74000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 839.258980][T11130] device ifb0 entered promiscuous mode [ 839.272147][T11130] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 839.297585][T11135] device ifb0 left promiscuous mode [ 839.476510][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:45:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0xe8, 0x0, 0xffffffffffffff0f) 17:45:12 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x8701000000000000, 0x12], [0xc1]}) 17:45:12 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x7a000000}) 17:45:12 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7a000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:12 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x7001, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:12 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 839.659771][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 839.665763][T11177] kvm [11176]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:45:12 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x7400, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:12 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x97ffffff, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 839.792693][T11196] device ifb0 entered promiscuous mode [ 839.818311][T11196] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:45:12 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x8704000000000000, 0x12], [0xc1]}) [ 839.869131][T11196] device ifb0 left promiscuous mode 17:45:12 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xc0ed0000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 840.088421][T11215] kvm [11209]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:45:12 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xe0ffffff, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 840.169568][T11196] device ifb0 entered promiscuous mode [ 840.175326][T11196] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:45:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) sendmmsg(r0, &(0x7f00000011c0)=[{{&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)="f9b27ff8ab05b02a1389716d35e52c9f4a4cdbdf0e7d565c4ec30c97afeced892c4ba2d22ce0e07c4bd42721e1583166210daf138a8c332921c91f41df60e3a0f9717bded36b06c3e9b19d49d16c3db503b075f1b079c8b4259d460bdd6ad794f390ef464cf6a141e93a9c446825b5102374058a83f99a33086bcf21fb9d0e57b0f5235860e8326a1587db8beed2a034f29969e2dee3816b61be51be2a2a8fd6e9add2908f39a9df6db69a82b51d7440a8af050fc1b856e3b04d954c5c5a575ac3b313af124641ba5211877d6d21f8db3011db4e740ae3c42205d0dd94086209da4a593a73d2b6c90af050106b3430", 0xef}, {&(0x7f0000000080)="fd35e37c94", 0x5}], 0x2, &(0x7f0000000300)=[{0xb0, 0x104, 0x7, "b89be85fcbabb64427bfc0780099f6a8776425d40dc6a4db0f3f8ddc19c138e7ce31febcca7fbb28baa3b3b7d9f7c757be2d5d416f301e4cfe8d5ebc7740ffcd1aafdc0e51357de3d7a114c1d846bdc5f4cbe5a8bf353b8a509b72f9ea785e8cdbf013fec7d89b2b548c3b5283c94fc8a644fcd5bbbb790b407b1d9cc10920284d7692c1f4d3926b622c58815dc9e26646484d62829093aeff89ab9971a0"}, {0x90, 0x115, 0x8, "d3ef1fb2455c7ff78d9f79b0a8cae75868ef687ae78f8aca7d30ac339399ec39a669b8c5628614777cf73ff65ef517935f86af29d0f65361577a84da5adee266733508e4d8ef9ed0904037a8dc2961b3f673ecad6a0a54955a6644b9fb846600c73c37f6eb615c0f5ad334d04d87e357f42cda1df5c8c61205cc11"}], 0x140}}, {{&(0x7f0000000440)=@rxrpc=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e23, 0x9, @mcast2, 0x3}}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000004c0)="a75e547b881e573035f5da11d748ce39218328976334e004ba8bc6b571fa7b0fbc48a6a9bf36c7124337533e9a58476f4d8be532db417ac47ece6c22f5862578218fe29aec99ad84bdcfb933b2d9a9bbe2bdf2d44bc210f97acf44c039b14e104b332edc7f6cc6609c2115d75cdc38e5e5fd0787b05af64738ed6e3eda961af19205849dd0141d8b0b039054012a46679b05bc5ba207c61d137c37d0dcdf7160747df31e4d584f5dc38fbc43355d0545bb9c34259e5f97bac19c71611f7ae18849dffb35ab91", 0xc6}, {&(0x7f0000000180)="b95aa51c1e9b9cacd1fc4d24978f50ae156f", 0x12}, {&(0x7f00000005c0)="768a9f986ad5624ed3f926d9a1617ad6f56290d2877661ef0899", 0x1a}, {&(0x7f0000000600)="4e6ceb5cff779fddbac0b11fff8aba78cf627776376c0bb2c07e8fe387bb5f9393acbfa899e5d8c84f5723ace09eb1333e1997cf89d66024b6e94d12e0d47c1e226f981512ef09b3a0d58ff853bc46252a4f52c795a93fdbe0274b5524c4bd9cd3e28fe8fbf05fa1c9756084e93f3895398b1f5a0e4687bd7f77f265b1d9fbadf0c86fdaffbe81285c14ecad7a1188b61583d66cd6ad0b10", 0x98}], 0x4, &(0x7f0000000700)=[{0x88, 0x117, 0x9, "1e87fa8824e6f5e27d192941f3f1072bf2a8f9f2c0fda93b1fb3661d6406366f244550a5f439b92a10dad022ab6fa248ea9e2679f078dc378a5150b13489e5786505e9f91564269166fd63796ba232f7f0848b1eca4c87311be65530d345f746bc7e45c8f8382a24d88615c786612a9551"}, {0x88, 0x19e, 0x469, "7a44e3cab967c77c0c2f7c3ccdf42a741975a7b0b6ff4fb8049b406f2d0b5c79cc5b1fe87537c8a505c49e995f309086d8aecf56c4200cf6196ff3fdba64ff7f7c8b1a9fce741cb1c8097f18f704fd55643f7406ee0733062e1656ec317db63f04a9e82d39484910df278ba4b4039d8eb12b497d"}], 0x110}}, {{0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000840)="6690a5fd5ec6726eae4e5eddb7744fcef82d02bce198f303f42bb51c2f68398d271fe3aa5e6f5a8fe2138097fbeb4c03610ebe207e3b98dee1a8f704a7f5c2b4b1f33f19ffbbb184f4083138b497b74d3a46411a6dcc060c919cf76d456fc4ede895514549d4e9e15909cb6779eb9beb707a1ce41c16ff8a95a98b4453679d11655d6040e2085c2de3adc532fd", 0x8d}, {&(0x7f0000000900)="cb9ab9f78686c52959538827813d07abc7e7122f42fe6e3f4f491231d5441b", 0x1f}, {&(0x7f0000000940)="e58efa651326eeb737e22225a47d637b541fe1b086626947262797822e857ba5bd39f4e20637eaae327b33c44aade147674f27aa3602f0a744089e028f04767aa31bcbc920d925074fa9e15f22ce313f448a9396e16e716ea8fafe633df8cc4170cd49b3eb372c4b22416c9f703f2e99f6781c6581333b8a64413b89767f15e59f5b9dc320348a90034907d6eb0a848a6ad20d2cb5a96697bd7adb13cb6fc0c2b75807b09b46af20e6fccca0d2f27cab64c815f6f1ed02731a10968762b5f41487f93e3b95e68a", 0xc7}], 0x3, &(0x7f00000018c0)=[{0x20, 0x0, 0x0, "3843bfba651475130cb4"}, {0x30, 0x0, 0x8, "381782aee4420543ffbfe07f9c2a50eaba868bfaa9a9debfd897"}, {0x1010, 0x88, 0x40, "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"}, {0x48, 0x107, 0x7fff, "038e9e50234ac39e0dfcdacf03e28a84525476ef033d7f6b3f09f1a6cca96eaca7bd6593d06c1c5e4ba499f1bbb048c6f17060aff3c65d"}], 0x10a8}}, {{&(0x7f0000000a80)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e24, @broadcast}, 0x1, 0x3, 0x1}}, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000b00)="8a634ea7863fa45922479d43c914eb99ec97014cc51c6c93dc19e100ad037c3142679923448a9c9bade388cf063bc724b052c70c281f3846f5148c2a565391d0f011a983eb99aac484c7d414449c4afab034860bc957f8269f1e9c73afe6569c0fe6c5decfc5858c9be70d4d83851f79dc1f673a31656d485dbac2fa862e877e3da8b9ae952458c3a25454b2bff80a9a6860127de821dca64cf9522f2200319e2587152621c0085928cdd6426dab3ab73d34afd296db25335c0fbb03bb1ed892229cf69a9175f5d682f066899d88887a0f0f674490d346b17bcb436e80d7994366e26cb3f521f75b6441461242d5bf948bb4e2", 0xf3}], 0x1, &(0x7f0000000c40)=[{0x30, 0x10f, 0x1c28, "0ceaea5e754307f5a03ff0b51aa129256f7a4dd1bb08c62ac08e6432fe9f"}, {0xa8, 0x109, 0x2, "768aef50d6d232a6c88a56044cedb51e7c9a0475fa38e58dcf77764157ab7db17966d735083a7e0852b0a06d36323c2c98b83ab98f23353ec791d76204105e472877a08f5fc3e7c3ce0954ec6fa037756e56a5de87b03574b4df9e6f646d5e72714b3662dc47122389faa2399ca3b898ee370941f479e1652521dc53902960b28c013af3411ed56f8ab665940fc0c4d0e930d8c8fbe6"}, {0x98, 0x0, 0x8000, "43ee4b89855fcab9c0ad6816392481e2eb0c950558ebb37f8bdfa2c6e477baad3941359c3f802be0ee599202387849a1e025e3df4e52f0a65bdbb38fae1dcbe055e4a08a26dafa530fb2b693cc22ebc55a340f5dd279edcebe6136fe1982f9368b70822a8f579f94d5710e6288de880a306cdece2d27c53bb3b32555ca4061041551a3d5"}, {0x60, 0x113, 0x5, "d2b8dc155a619957e10448f70ac3b5d3750641835127509070fb5b3324b47ce5110c4aa4a8e2f6f9e72b4d6ba401d0f86f3db0367a56314fbc5e93ec269383f097b4c5031b277386cbfebc34be2700"}, {0x90, 0x10f, 0x4, "712d9c1099e39e4ad907fca5350f42017c1c0d475509aab5e86221db6caa64bc683d0080860cc22cf34333f5ee128450bd6aebe379ec8574f517d5d4d45c322c9b191399baded766bdb165a1ebe948815fd87ae6f5db9762178e21e8cccc8f37c34bb1d9eab9e7063c81c06c6f48e635a6fa56bf734ed5431ec41709"}, {0xe0, 0x10a, 0x7fffffff, "d66597434cc18c30d550a89b205dc9c5f892b1d7a9d1eb60d7bfcd571f56a162f81290b9f002848cef35df56c7591b06107c3a810674c245db7ebd99a0c7cfe78425f0a0d5b886cfd8b8a77c88973af47eb5299fafb5a46ff0ef8516ecd8b4ac758e16dc8bd60a2e7d3e01a2111b9d392461f28f1dae5da1f5593d9d50b56ff2c1ddabb94b3c93804c8dd074c4883a72fd0dc0cacbae8afcb2a2b3927c9dfbe831651dd7d5bb0a1ac82ac6b072ccbc6e9e740666bdef904b20f37603da1b832e7aedd77cfaf5b1afc355fccc9f9bf5"}], 0x340}}, {{&(0x7f0000000f80)=@llc={0x1a, 0x301, 0x7f, 0x2, 0xffff, 0x6}, 0x80, &(0x7f0000001080)=[{&(0x7f0000001000)="718b9b4b", 0x4}, {&(0x7f0000001040)="b1fc6fca7b38aa7fe3da9c0a789695a0b737c078fc353c12056b16e5c2", 0x1d}], 0x2, &(0x7f00000010c0)=[{0x58, 0x107, 0x8e, "e5a27e04ac9ff085dd9937753a41ed1eed8b0c00b53a1fbc57ca1c228d2b63e2f5284fc5d5f844f500b7d02c375212147c9035ab2a953161963086b80319c3acdceeda6369c9"}, {0x28, 0x13f, 0xff, "b97f2775fed27b43f6d715b82156c8cf43"}, {0x40, 0x117, 0x56a2, "1c69f6f4ec1837528bccaa12f142b317511981217c6bc2e19d9db9c27b7676e8e3e2243f0523f1aeb84b92ab7338134e"}, {0x20, 0x1, 0x3fffc000000, "6682393faa1f813857009a51fa"}, {0x20, 0x6, 0x16d64517, "68e8e3483e3d2842df"}], 0x100}}], 0x5, 0x8000) [ 840.267089][T11219] device ifb0 left promiscuous mode [ 840.403790][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:45:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x2ee0, 0x0, 0xffffffffffffff0f) 17:45:13 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x7a00, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:13 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0xc3ffffff}) 17:45:13 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x8705000000000000, 0x12], [0xc1]}) 17:45:13 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xebffffff, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:13 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 840.575194][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 840.591006][T11243] kvm [11241]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 840.616677][T11253] device ifb0 entered promiscuous mode [ 840.637563][T11253] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:45:13 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0xffffffc3}) 17:45:13 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xedc0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:13 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xf9fdffff, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:13 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x8804000000000000, 0x12], [0xc1]}) [ 840.838733][T11264] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 840.871743][T11264] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:45:13 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfdfdffff, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 840.957403][T11272] kvm [11268]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:45:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x3) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r2 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r3 = semget$private(0x0, 0xffffffffffffffff, 0x103) semctl$IPC_STAT(r3, 0x0, 0x2, &(0x7f0000000200)=""/4096) setsockopt$inet_udp_int(r2, 0x11, 0x67, 0x0, 0x0) accept4$alg(r0, 0x0, 0x0, 0x800) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0xffffffac) bind$inet6(r2, 0x0, 0xdff59713880a3f40) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(r2, 0x0, 0xffffffffffffff12) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(r2, 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0xfffffffffffffdfc) openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x400, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, 0x0, 0x356) shutdown(r2, 0x3af7613f61c8941c) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffffffffffe4c, 0x10, 0x0, 0xffffffffffffff0f) 17:45:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x12402, 0x0, 0xffffffffffffff0f) 17:45:14 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x10000000000}) 17:45:14 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfdffffff, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:14 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xf003, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:14 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x8904000000000000, 0x12], [0xc1]}) [ 841.374286][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:45:14 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfffffdf9, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 841.481489][T11315] device ifb0 left promiscuous mode [ 841.535573][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 841.557442][T11319] kvm [11307]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:45:14 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xf203, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:14 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfffffdfd, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 841.678196][T11315] device ifb0 entered promiscuous mode [ 841.709220][T11315] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 841.759588][T11325] device ifb0 left promiscuous mode 17:45:14 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xffffff7f, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:14 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xfa03, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:14 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r2 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000200)={r3, @in={{0x2, 0x4e20, @empty}}, 0x23f2, 0x4, 0x9, 0x20, 0x3}, &(0x7f0000000080)=0x98) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:45:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0a) 17:45:15 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x8a04000000000000, 0x12], [0xc1]}) 17:45:15 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x1000000000000}) 17:45:15 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xffffff97, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:15 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xfb03, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 842.331416][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 842.446402][T11373] device ifb0 entered promiscuous mode [ 842.460240][T11368] kvm [11364]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:45:15 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffe0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 842.496663][T11373] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 842.514380][T11378] device ifb0 left promiscuous mode 17:45:15 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xfc01, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:15 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffeb, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:15 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:15 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xfc03, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 842.904906][T11373] device ifb0 entered promiscuous mode 17:45:15 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x8b00000000000000, 0x12], [0xc1]}) [ 842.948823][T11373] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 842.978200][T11378] device ifb0 left promiscuous mode 17:45:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x800, 0x0) ioctl$PPPIOCDISCONN(r2, 0x7439) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) [ 843.126086][T11413] kvm [11408]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 843.311923][ C1] net_ratelimit: 1 callbacks suppressed [ 843.311933][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:45:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0e) 17:45:16 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfffffffd, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:16 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xfd03, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:16 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x100000000000000}) 17:45:16 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x8b04000000000000, 0x12], [0xc1]}) [ 843.474012][T11437] device ifb0 entered promiscuous mode 17:45:16 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 843.517149][T11437] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 843.540401][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:45:16 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xfe03, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 843.565243][T11444] device ifb0 left promiscuous mode 17:45:16 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x80000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 843.648726][T11450] kvm [11439]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:45:16 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xedc000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:16 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:16 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xff03, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 843.898698][T11437] device ifb0 entered promiscuous mode [ 843.921493][T11437] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 843.983322][T11444] device ifb0 left promiscuous mode 17:45:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r2 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt(r0, 0x0, 0x1ff, &(0x7f0000000000)="11b961701fb145f18c2507a354d29850b977f70215ecaa8a175a974d64865c74bf97df334137ca4c0eff11fa77996415bcf310924cd1940f3c644fc56b7628928d9084d23524cd0041fece51d8be89bcfb7c568b575e8c5b143b6b7f441f7f768ef0c3e5f9be2b7be71ab8046a40deae2c9e", 0x72) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(r2, 0x0, 0x47) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="16b7c000d294ac9507814a4d27d0474d11f2741e9be6b5e1080024eb1e37fc36cd747668c5443655f717aeb07821f2efd97dd5f56c9452e11067ec619f072bbdbb0be55bb4ea2404c49c92d6324d08eb25e779c0dcb933e3ad7f12bec10b02191761e304d286236a0d7d27481d72311f13bf71e8cd6bf00d30f0859679763bb1081a0cc48a702d70f7c4e06759f104a9cdb363ffa7bbe2f078fe7457e4730780ceba99c527d10576837e0400afe1beae9c7e12742c5bbeef97b6551591bbe412086d2292d98fc10b3db9fbfec6d1e176b66d8ae1ca01ee1bbf565c35407f5a", 0x41d, 0x10, 0x0, 0x0) [ 844.342738][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:45:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff10) 17:45:17 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x8c04000000000000, 0x12], [0xc1]}) 17:45:17 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:17 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:17 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x200000000000000}) [ 844.458794][T11497] device ifb0 entered promiscuous mode 17:45:17 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 844.502094][T11497] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:45:17 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x80000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 844.542448][T11506] device ifb0 left promiscuous mode [ 844.548407][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 844.564254][T11510] kvm [11494]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:45:17 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:17 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x82000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:17 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 844.897326][T11497] device ifb0 entered promiscuous mode [ 844.930225][T11497] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:45:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:45:17 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x8d04000000000000, 0x12], [0xc1]}) [ 844.990290][T11506] device ifb0 left promiscuous mode [ 845.196422][T11545] kvm [11541]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 845.324409][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:45:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff14) 17:45:18 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x200800, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:18 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x500000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:18 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x300000000000000}) 17:45:18 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x8e04000000000000, 0x12], [0xc1]}) [ 845.478960][T11563] device ifb0 entered promiscuous mode [ 845.486431][T11563] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 845.516292][T11559] kvm [11558]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:45:18 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x600000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 845.520530][T11561] __ntfs_error: 4 callbacks suppressed [ 845.520540][T11561] ntfs: (device loop1): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 845.567818][T11561] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 845.576660][T11563] device ifb0 left promiscuous mode [ 845.586349][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:45:18 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 845.691704][T11561] ntfs: (device loop1): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. 17:45:18 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x800000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 845.766701][T11561] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 17:45:18 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:18 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x900000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 845.949021][T11563] device ifb0 entered promiscuous mode [ 845.973065][T11563] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:45:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffd2b, 0x22000004, &(0x7f0000000040)={0xa, 0x4e22, 0x3ff, @rand_addr, 0x9}, 0xfffffe24) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x4000000000066, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="03030a007fffffff001ba3711f7410416c5a75367e64c11f16e11f211d88c09b477561003d53978b8bcb2e69744db230ff28782741291216392597cb5b21ea0b6868055625a4e90ec75263"], 0x25, 0x3) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/ip6_tables_targets\x00') ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000240)={0x0, &(0x7f0000000200)=[{0x0}, {}]}) ioctl$DRM_IOCTL_UNLOCK(r3, 0x4008642b, &(0x7f0000000280)={r4, 0x10}) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:45:18 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x8f04000000000000, 0x12], [0xc1]}) [ 846.010819][T11587] device ifb0 left promiscuous mode [ 846.066642][T11595] ntfs: (device loop1): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 846.136425][T11600] kvm [11592]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 846.157421][T11595] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 846.244026][T11595] ntfs: (device loop1): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 846.270856][T11595] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 846.367267][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:45:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff18) 17:45:19 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xa00000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:19 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:19 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x400000000000000}) 17:45:19 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x9004000000000000, 0x12], [0xc1]}) 17:45:19 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xb00000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 846.532727][T11625] device ifb0 entered promiscuous mode [ 846.551742][T11622] ntfs: (device loop1): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 846.564955][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 846.599795][T11625] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 846.607164][T11622] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 846.667922][T11629] device ifb0 left promiscuous mode 17:45:19 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xc00000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 846.708283][T11637] kvm [11631]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:45:19 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x3000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:19 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xd00000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 846.923306][T11625] device ifb0 entered promiscuous mode [ 846.932189][T11625] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 846.940476][T11629] device ifb0 left promiscuous mode 17:45:19 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x4000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r2 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x82380, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ax25_SO_BINDTODEVICE(r2, 0x101, 0x19, &(0x7f0000000000)=@bpq0='bpq0\x00', 0x10) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:45:19 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xe00000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff25) 17:45:20 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x900d000000000000, 0x12], [0xc1]}) 17:45:20 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:20 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x500000000000000}) 17:45:20 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x5000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 847.336897][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 847.431699][T11679] device ifb0 entered promiscuous mode [ 847.457539][T11679] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:45:20 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1000000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 847.482418][T11687] device ifb0 left promiscuous mode [ 847.496732][T11676] kvm [11673]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 847.507634][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:45:20 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x6000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:20 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1100000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:20 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x7000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:20 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1200000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 847.876302][T11679] device ifb0 entered promiscuous mode [ 847.904731][T11679] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 847.919556][T11687] device ifb0 left promiscuous mode 17:45:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000000)='./file0\x00', r1, r2) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:45:20 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x9104000000000000, 0x12], [0xc1]}) [ 848.095902][T11722] kvm [11716]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:45:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff26) 17:45:21 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1f00000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:21 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x8000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:21 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x600000000000000}) 17:45:21 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x9e00000000000000, 0x12], [0xc1]}) [ 848.375584][T11733] device ifb0 entered promiscuous mode [ 848.407873][T11733] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 848.412917][ C1] net_ratelimit: 1 callbacks suppressed 17:45:21 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x2000000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 848.412926][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 848.441001][T11738] kvm [11734]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 848.452579][T11745] device ifb0 left promiscuous mode 17:45:21 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x9000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:21 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x2010000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:21 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x2500000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:21 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x260f000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 848.794968][T11733] device ifb0 entered promiscuous mode [ 848.823221][T11733] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 848.868533][T11745] device ifb0 left promiscuous mode 17:45:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) open(&(0x7f00000000c0)='./file0\x00', 0x100, 0x1) r2 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x100000001, 0x4000) sendmsg$IPVS_CMD_DEL_SERVICE(r2, 0x0, 0x4080) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xfffffffffffffff8, 0x40000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000200)={0x6, 0x118, 0xfa00, {{0x0, 0x8, "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", 0x93, 0x3, 0x4d, 0x80, 0x80, 0x7, 0x80000001}, r4}}, 0x120) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r5 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:45:21 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xa000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x9b35) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x10a) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:45:21 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xa001000000000000, 0x12], [0xc1]}) 17:45:21 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x2801000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:21 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xb000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:21 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x700000000000000}) [ 849.194279][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 849.292548][T11798] device ifb0 entered promiscuous mode [ 849.316144][T11798] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:45:22 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x2901000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:22 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xc000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 849.335464][T11796] kvm [11791]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 849.357235][T11801] device ifb0 left promiscuous mode 17:45:22 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x2a01000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:22 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xa00d000000000000, 0x12], [0xc1]}) 17:45:22 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3f00000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 849.546524][T11798] device ifb0 entered promiscuous mode [ 849.567159][T11798] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 849.609011][T11801] device ifb0 left promiscuous mode [ 849.672981][T11823] kvm [11817]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:45:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0xffffffffffffff34) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:45:22 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xd000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:22 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000180)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r2, 0x1) accept4(r1, 0x0, 0x0, 0x0) 17:45:22 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:22 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x800000000000000}) 17:45:22 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xb000004000000000, 0x12], [0xc1]}) 17:45:22 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xe000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:22 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x4800000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 850.233196][T11859] device ifb0 entered promiscuous mode [ 850.259273][T11851] kvm [11850]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 850.264591][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 850.271906][T11859] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 850.290610][T11862] device ifb0 left promiscuous mode 17:45:23 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x10000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:23 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x4c00000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:23 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x5c00000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 850.544034][T11878] __ntfs_error: 50 callbacks suppressed [ 850.544045][T11878] ntfs: (device loop1): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 850.582872][T11859] device ifb0 entered promiscuous mode 17:45:23 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6800000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 850.585050][T11878] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 850.607213][T11859] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 850.634648][T11862] device ifb0 left promiscuous mode [ 850.697094][T11878] ntfs: (device loop1): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 850.725486][T11878] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 17:45:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x4) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:45:23 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xb100004000000000, 0x12], [0xc1]}) [ 850.856948][T11893] kvm [11892]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 851.107032][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:45:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_cache\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f00000017c0), 0x1fe, 0x400000000000) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) 17:45:23 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6c00000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:23 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x11000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:23 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x900000000000000}) 17:45:23 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xb200004000000000, 0x12], [0xc1]}) [ 851.243115][T11921] ntfs: (device loop1): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 851.269507][T11925] device ifb0 entered promiscuous mode 17:45:24 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7400000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 851.295110][T11921] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 851.308977][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 851.322865][T11925] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 851.335060][T11924] kvm [11922]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:45:24 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7a00000000000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 851.383556][T11921] ntfs: (device loop1): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 851.394990][T11930] device ifb0 left promiscuous mode [ 851.398001][T11921] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 17:45:24 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x12000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:24 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xb300004000000000, 0x12], [0xc1]}) 17:45:24 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 851.543975][T11925] device ifb0 entered promiscuous mode [ 851.554670][T11925] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 851.579298][T11930] device ifb0 left promiscuous mode [ 851.677984][T11945] ntfs: (device loop1): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 851.735456][T11945] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 17:45:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x18080, 0x0) write$eventfd(r2, &(0x7f0000000040)=0x8221, 0x8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:45:24 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x97ffffff00000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 851.793075][T11952] kvm [11948]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:45:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r2 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(r0, 0x0, 0xfffffffb80000000) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000000)={0x0, @initdev, @empty}, &(0x7f0000000040)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000080)={'team0\x00', r3}) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:45:24 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0xa00000000000000}) 17:45:24 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xe0ffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:24 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1f000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:24 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xb400004000000000, 0x12], [0xc1]}) [ 852.099389][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:45:24 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xebffffff00000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 852.182192][T11982] device ifb0 entered promiscuous mode [ 852.237071][T11982] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 852.242852][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 852.260394][T11991] device ifb0 left promiscuous mode [ 852.265709][T11986] kvm [11979]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:45:25 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:25 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:25 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xf9fdffff00000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:25 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20100000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 852.611341][T11982] device ifb0 entered promiscuous mode [ 852.617185][T11982] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 852.701035][T11991] device ifb0 left promiscuous mode 17:45:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) r2 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r3 = accept4(r2, 0x0, 0x0, 0x80801) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:45:25 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xb500004000000000, 0x12], [0xc1]}) [ 852.915077][T12028] kvm [12021]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 853.020954][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:45:25 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) recvmsg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000000)=""/138, 0x8a}, {&(0x7f00000000c0)=""/13, 0xd}, {&(0x7f0000000180)=""/54, 0x36}, {&(0x7f0000000200)}, {&(0x7f0000000240)=""/4096, 0x1000}], 0x5, &(0x7f00000012c0)=""/186, 0xba}, 0x1) r2 = socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r3 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(r3, 0x11, 0xfffffffffffffffe, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000000200)='ip_vti0\x00') setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:45:25 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfdfdffff00000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:25 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x25000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:25 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0xb00000000000000}) 17:45:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0xfffffffffffffffd) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x274) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:45:25 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xb600004000000000, 0x12], [0xc1]}) 17:45:25 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfdffffff00000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 853.185576][T12046] device ifb0 entered promiscuous mode [ 853.191957][T12046] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 853.207568][T12041] kvm [12038]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 853.242125][T12046] device ifb0 left promiscuous mode [ 853.250251][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:45:26 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x260f0000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:26 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xffffff7f00000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:26 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:26 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2a010000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:26 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xb700004000000000, 0x12], [0xc1]}) [ 853.599467][T12046] device ifb0 entered promiscuous mode [ 853.634546][T12046] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 853.716128][T12072] device ifb0 left promiscuous mode [ 853.812880][T12081] kvm [12075]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 854.042028][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:45:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r2 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(r2, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:45:26 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff0f, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:26 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0xc00000000000000}) 17:45:26 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x3f000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:26 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xc100000000000000, 0x12], [0xc1]}) 17:45:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0xffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x1, 0x80) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, 0x0, 0x21c555375577a0b6) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) r3 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) mincore(&(0x7f0000ff3000/0xb000)=nil, 0xb000, &(0x7f0000000000)=""/19) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r4 = accept4(r3, 0x0, 0x0, 0xfffffffffffffffd) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) [ 854.152312][T12100] device ifb0 entered promiscuous mode 17:45:27 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffe0, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 854.228226][T12100] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 854.239430][T12106] kvm [12104]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 854.248645][T12112] device ifb0 left promiscuous mode [ 854.258025][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:45:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r2 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, 0x0, 0xa0cf94fe2ee40109) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCAX25GETINFO(r2, 0x89ed, &(0x7f0000000040)) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000000)={0x0, 0xfffffffffffffe0e, 0xff, 0x80, 0x2, 0x0, 0x12}, 0xc) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:45:27 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:27 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:27 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 854.590363][T12100] device ifb0 entered promiscuous mode [ 854.625305][T12100] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:45:27 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xc200000000000000, 0x12], [0xc1]}) [ 854.659573][T12112] device ifb0 left promiscuous mode [ 854.861006][T12139] kvm [12138]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 855.043766][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:45:27 executing program 4: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/exec\x00', 0x2, 0x0) vmsplice(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="4a7c60ccd693a55c4516eaa12f49362c9fe574e75422ebd5b72feb23599b9c991db02256629429037cca5a63a8a4f4875f712feeb3ae02d0f58b6bd044d1fd2715a617078c806664d67f39ea4c7ba8740d00fe22c95c5f66cec380c5c4ccb48086948bd9f89fc38c289e0b6a9008179a5bf416208cb203d5ba4ba571c36ff3c8bce670e00f6a85d57b4a11110050ba", 0x8f}, {&(0x7f0000000080)="28c7f3113674ceee4ffc6be0dce1bfb07805147ff772fa055cbb69ac9d4186be8c30ca0f", 0x24}, {&(0x7f00000002c0)="4e41bd75b846e2d6d720010cdec95549b6e55b5aaf06707225030701723391e3b0c925b0643d21f9b05e8c494f1bf8f8c434b7bf7a850f1308693c4ad5e242a6b64e7d0b80260a3831599ce5fabc9b56d9bd45620379ac48b7e3bbfd08243f54fd599ec2a722bb593c3799b28b00e826e020b07b8098c061d39a5e97fa1fc447f8e01639c50f7c8c57eb9923bb8aa63ed8b0a5be6e41", 0x96}], 0x3, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x4000000000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r3 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(r3, 0x114, 0x8, 0x0, 0xffa8) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) bind$inet(r3, &(0x7f0000000000)={0x2, 0x4e22, @loopback}, 0x10) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r2, 0x1) r4 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:45:27 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x48000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:27 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x3, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:27 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0xd00000000000000}) 17:45:27 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xce00000000000000, 0x12], [0xc1]}) [ 855.129421][T12154] device ifb0 entered promiscuous mode [ 855.160552][T12154] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 855.189838][T12167] device ifb0 left promiscuous mode [ 855.199931][T12159] kvm [12158]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 855.212565][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:45:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) r2 = socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r3 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x19}}}}, &(0x7f00000000c0)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000180)={r4, 0x5, 0x30}, &(0x7f0000000200)=0xc) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r5 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:45:28 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x4b010000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:28 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:28 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xd004000000000000, 0x12], [0xc1]}) [ 855.471530][T12154] device ifb0 entered promiscuous mode [ 855.485343][T12154] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 855.566176][T12167] device ifb0 left promiscuous mode [ 855.587396][T12189] __ntfs_error: 36 callbacks suppressed [ 855.587404][T12189] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 17:45:28 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x4c000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 855.666318][T12189] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. [ 855.697358][T12195] kvm [12188]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:45:28 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x5, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 855.791447][T12199] ntfs: (device loop1): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 855.833475][T12199] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 17:45:28 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0xe00000000000000}) [ 855.914676][T12204] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. [ 855.926203][T12199] ntfs: (device loop1): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 855.972868][T12199] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 856.024730][T12212] device ifb0 entered promiscuous mode [ 856.034283][T12212] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:45:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) r2 = socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) accept(r2, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000080)=0x80) 17:45:28 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xd901000000000000, 0x12], [0xc1]}) 17:45:28 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x50010000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 856.103281][T12212] device ifb0 left promiscuous mode 17:45:28 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x6, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 856.221377][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:45:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r2 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) r3 = getuid() getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) sendmsg$nl_netfilter(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x18}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)={0x254, 0x5, 0x9, 0x4, 0x70bd2a, 0x25dfdbfd, {0xd, 0x0, 0x4}, [@nested={0x148, 0x3a, [@typed={0x8, 0x3e, @ipv4=@dev={0xac, 0x14, 0x14, 0xc}}, @generic="fb3634de2cda07bd75dd7d9a62092055df664b29fd801904c455d5b6da50079c385a6e8a4d9711bd358fbf9bf992209e29c96ac5a990d2889fd3033e38619de556231d25f4bac732618c8b6760212913c586b084bfa90dbe0f77fe86baaba4200a5abf1206f1e5ba6b8c9ad8591e5ffa4382c73baecd880e794666c481e428", @typed={0x10, 0x5b, @str='illinois\x00'}, @generic="c8593d9c2496a800b11fbc3e283b73fb08c8aa3c0bf0ee4861e0545c80ec94b63584d6b7abf2cb731f1edbcc1919fd0df0c048e7f15f2db6a50c67aa6267a5e4e521631cce4ed42b0a65eba98e9ea57d290ef68004194b5f2bf364ec250db6c6b770cf5c25c9d68d708dcf27b1eb0968f7e812b549e810734971be588718197cee7f6faf9ad33dee57b1604efb24e0172ef6205c139a8461b633ab5050", @typed={0x8, 0x39, @uid=r3}, @typed={0x8, 0x5f, @uid=r4}]}, @nested={0x18, 0x3b, [@typed={0x14, 0xb, @ipv6=@mcast1}]}, @typed={0xc, 0x6f, @u64=0x4}, @nested={0xd4, 0x7a, [@generic="deaf3027ef812e13f47877f720aa0f55982b116e0f62b91be5d8b9a8fa9108f882ce9888702e405c8afcce2f232ab22e89194b10723d5d056b14492090a9a026327869c8754a323cbece74d45cee24808016dd4b834cf09f7bcf6d44b34c60c643c91a0ad7683ae8b95393cd9635ce98ad9143235d195f1f59dc655b7b63f84a2a39b58dc4c1cf3cfc94d51a07db13650b333d79adf64a5d37391a1a718d201731bfd0c01d6707e481ac89e689e21f127504833cf1a2dc1e7621934950e8ef705996505d5519cbe9f8b9d88185790842"]}]}, 0x254}, 0x1, 0x0, 0x0, 0x4}, 0x404c000) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r5 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) [ 856.347011][T12229] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. [ 856.367478][T12232] ntfs: (device loop1): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 856.376539][T12212] device ifb0 entered promiscuous mode [ 856.397374][T12212] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 856.461722][T12235] device ifb0 left promiscuous mode [ 856.484409][T12229] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 17:45:29 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xe006000000000000, 0x12], [0xc1]}) 17:45:29 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x5a020000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:29 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x7, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 856.753587][T12250] kvm_set_msr_common: 1 callbacks suppressed [ 856.753602][T12250] kvm [12246]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:45:29 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x5c000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:29 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x1000000000000000}) 17:45:29 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xfc01000000000000, 0x12], [0xc1]}) 17:45:29 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x8, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 856.979744][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 857.042923][T12265] device ifb0 entered promiscuous mode [ 857.056295][T12265] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:45:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r2 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) getcwd(&(0x7f0000000000)=""/70, 0x46) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000080), &(0x7f00000000c0)=0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) socket$inet(0x2, 0x80007, 0x9) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) [ 857.096016][T12275] device ifb0 left promiscuous mode [ 857.131499][T12273] kvm [12271]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:45:29 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x68000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:30 executing program 3: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000080)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, r1}, 0x14) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f00000000c0)) r4 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x80000000, 0x341400) sendmsg$IPVS_CMD_DEL_SERVICE(r4, 0x0, 0x4040000) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r3, 0x1) r5 = accept4(r2, 0x0, 0x0, 0x0) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:45:30 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x9, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:30 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0xffffffff00000000, 0x12], [0xc1]}) [ 857.420937][T12265] device ifb0 entered promiscuous mode [ 857.430535][T12265] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 857.443066][T12275] device ifb0 left promiscuous mode 17:45:30 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x6c000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:30 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x1100000000000000}) [ 857.603467][T12311] kvm [12310]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:45:30 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xa, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:30 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x0, 0x10], [0xc1]}) [ 857.733102][T12321] device ifb0 entered promiscuous mode [ 857.748277][T12321] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 857.762202][T12321] device ifb0 left promiscuous mode 17:45:30 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x70010000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 857.923994][T12331] kvm [12324]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 857.935643][T12321] device ifb0 entered promiscuous mode [ 857.978832][T12321] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 857.989331][T12332] device ifb0 left promiscuous mode 17:45:30 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x0, 0x7fffffff}, 0x8) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:45:30 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xb, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 858.120187][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:45:30 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x74000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r2 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x7fff}, &(0x7f0000000040)=0xc) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000200)=ANY=[@ANYRES32=r3, @ANYBLOB="01006500b294509a505a98b8e95e78653010163b275a9c71cda5547c2a7c7274706de616e3fd47cc58a89b7228cf18ab9c6eb0203737262782a78a718741b98884ec96e62599c7c9536459c6f44910698a6e1d4dc1059d44c93166741e6f1ce8122542decde4440109724148068da0bb1e89f1402ebf8294d922a49ac4114e25fa1db3a1c8da47b5cdacfa0936af6b3e03d667c6a6e96a53f5753afa6af0315ff25c72c6486ffbf2d5ac4ce261b6e0f4560e224380784e1da7be"], 0xfffffffffffffefc) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:45:31 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xc, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:31 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x0, 0x11], [0xc1]}) 17:45:31 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x1200000000000000}) [ 858.451159][T12371] device ifb0 entered promiscuous mode [ 858.491299][T12371] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:45:31 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x7a000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 858.577101][T12376] device ifb0 left promiscuous mode [ 858.594494][T12377] kvm [12373]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:45:31 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xd, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:31 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x8cffffff, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:31 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x0, 0x1b], [0xc1]}) [ 858.854861][T12371] device ifb0 entered promiscuous mode [ 858.881882][T12371] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:45:31 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xe, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 858.901369][T12376] device ifb0 left promiscuous mode [ 858.917362][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:45:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(r0, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1, 0x800) write$P9_RFLUSH(r2, &(0x7f0000000040)={0x7, 0x6d, 0x1}, 0x7) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(r0, 0x0, 0xffffffffffffff93) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) [ 859.044714][T12410] kvm [12401]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:45:31 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x97ffffff, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:31 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x2000000000000000}) [ 859.232078][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:45:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) r2 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="2f6465762f6e62643040c7d1831ef329287ae4f21b7d386fec9a30a4bdce2f7c9becac330a5aed"], &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='nfsd\x00', 0x800, &(0x7f00000000c0)='illinois\x00') bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000180)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='ecryptfs\x00', 0x200000, &(0x7f0000000280)) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) syslog(0x0, &(0x7f0000000280)=""/169, 0xa9) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:45:32 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:32 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x0, 0x34], [0xc1]}) [ 859.339755][T12428] device ifb0 entered promiscuous mode [ 859.346368][T12428] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 859.396781][T12428] device ifb0 left promiscuous mode 17:45:32 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xc0ed0000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:32 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x11, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 859.491115][T12444] kvm [12436]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:45:32 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xebffffff, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 859.638949][T12428] device ifb0 entered promiscuous mode [ 859.648537][T12428] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 859.669060][T12455] device ifb0 left promiscuous mode 17:45:32 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x2500000000000000}) 17:45:32 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x0, 0x3a], [0xc1]}) 17:45:32 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x12, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 859.889992][T12467] device ifb0 entered promiscuous mode [ 859.896142][T12467] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 859.916317][T12467] device ifb0 left promiscuous mode [ 860.023520][T12477] kvm [12469]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:45:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:45:32 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xf0030000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:32 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x25, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 860.200717][T12467] device ifb0 entered promiscuous mode 17:45:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) ioctl$TUNSETLINK(r3, 0x400454cd, 0x103) 17:45:33 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x0, 0x3b], [0xc1]}) [ 860.255476][T12467] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 860.277458][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 860.298413][T12489] device ifb0 left promiscuous mode 17:45:33 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xf2030000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 860.472573][T12510] kvm [12502]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:45:33 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x48, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:33 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xf6ffffff, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 860.629565][T12517] __ntfs_error: 49 callbacks suppressed [ 860.629573][T12517] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 17:45:33 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x3f00000000000000}) 17:45:33 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x0, 0x48], [0xc1]}) [ 860.800531][T12517] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. [ 860.810399][T12527] device ifb0 entered promiscuous mode [ 860.849279][T12527] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 860.877555][T12532] device ifb0 left promiscuous mode 17:45:33 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x4c, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:33 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xf9fdffff, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 860.985825][T12527] device ifb0 entered promiscuous mode [ 860.996391][T12527] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 861.005277][T12532] device ifb0 left promiscuous mode [ 861.077544][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 861.098902][T12541] kvm [12536]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:45:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x9, 0x86000) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vfio/vfio\x00', 0x1, 0x0) ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f0000000240)={0x0, &(0x7f0000000280), 0x0, r3, 0x1}) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0xf) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(r1, 0x0, 0x2042) getsockname$ax25(r3, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000000), 0x4) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f0000000080)="b1fd6be9c0501590a3af63a861163d5032205421a5668b90fc2613979fa80d9fcf4406cda4df9097f43667", 0x83c8be93, 0x10, 0x0, 0xffffffffffffffee) 17:45:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x20000800) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:45:34 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x4000000000000000}) [ 861.252094][T12548] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 17:45:34 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xfa030000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 861.336345][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:45:34 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x0, 0x49], [0xc1]}) [ 861.446637][T12548] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. [ 861.460600][T12569] device ifb0 entered promiscuous mode [ 861.508228][T12569] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 861.529976][T12575] device ifb0 left promiscuous mode 17:45:34 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x5c, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:34 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xfb030000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 861.733932][T12584] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. [ 861.789078][T12569] device ifb0 entered promiscuous mode [ 861.811388][T12569] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 861.845124][T12575] device ifb0 left promiscuous mode [ 861.864941][T12584] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 17:45:34 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x68, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:34 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xfc010000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:34 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x0, 0x79], [0xc1]}) 17:45:34 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x4800000000000000}) [ 862.093547][T12608] device ifb0 entered promiscuous mode [ 862.109409][T12608] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 862.123072][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 862.150903][T12607] kvm_set_msr_common: 1 callbacks suppressed [ 862.150917][T12607] kvm [12604]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 862.167991][T12610] device ifb0 left promiscuous mode 17:45:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x7ff, 0x4000) ioctl$KVM_GET_CPUID2(r1, 0xc008ae91, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(r1, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r3, 0xc004aea7, &(0x7f0000000000)=0x3) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='lp\x00', 0x3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r2, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:45:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r2 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r2, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="18000000", @ANYRES16=r3, @ANYBLOB="000826bd7000fbdbdf251207000004000500518d2e5ec6c04da69281a0926cf572214d1a3307ea244a1ab8da3945939ec44d530aeacc1158116c28163d"], 0x18}, 0x1, 0x0, 0x0, 0x24040800}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, 0x0, 0x0) shutdown(r1, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:45:35 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xfc030000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:35 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x6c, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:35 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x0, 0x8b], [0xc1]}) [ 862.403675][T12608] device ifb0 entered promiscuous mode [ 862.410557][T12608] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 862.463440][T12610] device ifb0 left promiscuous mode [ 862.533326][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 862.537458][T12636] kvm [12627]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:45:35 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xfd030000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:35 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x74, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:35 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x4c00000000000000}) 17:45:35 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xfdfdffff, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:35 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x7a, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:35 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x0, 0x9e], [0xc1]}) [ 862.989978][T12660] device ifb0 entered promiscuous mode [ 863.026883][T12660] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 863.041623][T12668] device ifb0 left promiscuous mode [ 863.048162][T12657] kvm [12655]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:45:35 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xfdffffff, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e21}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) [ 863.297088][T12660] device ifb0 entered promiscuous mode [ 863.307483][T12660] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 863.320764][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:45:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) r2 = socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(r2, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) r3 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) getsockname$llc(r3, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x10) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000000)={{0xa, 0x4e21, 0x7, @remote, 0x20}, {0xa, 0x4e20, 0x0, @empty, 0x2}, 0x6b29, [0x2, 0xfffffffeffffffff, 0xff, 0x4, 0x3, 0xffff, 0x80000000, 0x4]}, 0x5c) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f0000000200)="70d2ffcca62cd0d8ea20df4f8e5c191fa7546afb899af20af8910ff77e0a5159fb3bcdbdd2c330aa5cdd9900eecfcd7ea65c19ba9c249b0df41ef69e3c9eb1479bc97c42d2bd3ea7e09db0821914c85515a64870f032672baedc2b388010eeedd6fe7385e9bab085748868e24e3e", 0x6e, 0x10, 0x0, 0x0) 17:45:36 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xe0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:36 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x0, 0xc1], [0xc1]}) [ 863.359657][T12668] device ifb0 left promiscuous mode 17:45:36 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xfe030000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:36 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x128, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 863.512013][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 863.542629][T12700] kvm [12693]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 863.579902][T12700] kvm [12693]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:45:36 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xff030000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:36 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x5c00000000000000}) 17:45:36 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x0, 0xc2], [0xc1]}) 17:45:36 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x129, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 863.788996][T12717] device ifb0 entered promiscuous mode [ 863.803358][T12717] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 863.869229][T12721] device ifb0 left promiscuous mode 17:45:36 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffdf9, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 863.955821][T12731] kvm [12726]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc2 data 0x0 [ 863.977847][T12731] kvm [12726]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:45:36 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x12a, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) [ 864.123884][T12717] device ifb0 entered promiscuous mode [ 864.145717][T12717] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 864.258573][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:45:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r2 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x48, &(0x7f0000000000)=[@in={0x2, 0x4e23, @multicast2}, @in6={0xa, 0x4e22, 0x1, @empty, 0x3}, @in6={0xa, 0x4e24, 0x8, @ipv4={[], [], @multicast1}, 0x6}]}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000180)={0x2, 0x6, 0x820e, 0x3, 0x5aa, 0xd47, 0x8, 0x9, r3}, 0x20) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(r2, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:45:37 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffdfd, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:37 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x6000000000000000}) 17:45:37 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x300, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:37 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x0, 0xce], [0xc1]}) [ 864.391252][T12754] device ifb0 left promiscuous mode [ 864.392223][T12756] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 17:45:37 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff7f, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 864.485688][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 864.571017][T12756] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. [ 864.591212][T12776] kvm [12766]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:45:37 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff8c, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:37 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x500, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 864.786444][T12754] device ifb0 entered promiscuous mode [ 864.804161][T12754] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 864.813243][T12780] device ifb0 left promiscuous mode [ 864.869371][T12786] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 17:45:37 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x0, 0x10a], [0xc1]}) 17:45:37 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff97, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:37 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x6800000000000000}) 17:45:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r2 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, 0x0, 0xbec53ab1beddbe14) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x7, @remote, 0x81}, 0x1c) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) [ 865.069340][T12786] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. [ 865.089705][T12797] kvm [12794]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 865.164168][T12805] device ifb0 entered promiscuous mode [ 865.194695][T12805] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 865.223482][T12811] device ifb0 left promiscuous mode [ 865.250476][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:45:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r2 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCNRDECOBS(r2, 0x89e2) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:45:38 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x600, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:38 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x0, 0x11e], [0xc1]}) 17:45:38 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffeb, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 865.433295][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 865.511344][T12828] kvm [12821]: vcpu1, guest rIP: 0xfff0 ignored wrmsr: 0x11e data 0x0 17:45:38 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x700, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 865.556349][T12828] kvm [12821]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:45:38 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffff6, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 865.597303][T12805] device ifb0 entered promiscuous mode [ 865.616447][T12805] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 865.626958][T12811] device ifb0 left promiscuous mode [ 865.749078][T12841] __ntfs_error: 2 callbacks suppressed [ 865.749087][T12841] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 17:45:38 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffffd, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 865.894551][T12841] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 17:45:38 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x6c00000000000000}) 17:45:38 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x0, 0x140], [0xc1]}) 17:45:38 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x900, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x100000001, @rand_addr, 0x7}, 0xfffffffffffffdfb) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r2 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0x1f, 0x100, &(0x7f0000001880)={0xa, 0x0, 0xffffffffffffffff}, 0x1c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(r2, 0x0, 0x5d9) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000100)={0x0, 0x7fff}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000240)={r3, 0x5}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000080)={r4, 0x1, 0x30, 0xabf, 0x1}, &(0x7f00000000c0)=0x18) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) shutdown(r1, 0x1) r5 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) [ 866.094418][T12857] device ifb0 entered promiscuous mode [ 866.122343][T12857] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 866.141701][T12863] device ifb0 left promiscuous mode [ 866.221162][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:45:39 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 866.290319][T12866] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 17:45:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r2 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) setsockopt$inet_mreqsrc(r2, 0x0, 0x2f, &(0x7f0000000000)={@remote, @loopback, @dev={0xac, 0x14, 0x14, 0xe}}, 0xc) shutdown(r1, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) [ 866.399306][T12866] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. [ 866.476792][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 866.505534][T12857] device ifb0 entered promiscuous mode 17:45:39 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x0, 0x174], [0xc1]}) 17:45:39 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xa00, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 866.532949][T12857] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 866.554798][T12863] device ifb0 left promiscuous mode 17:45:39 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x80000000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 866.737143][T12897] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 17:45:39 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x7400000000000000}) 17:45:39 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xedc000000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:39 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x0, 0x175], [0xc1]}) [ 866.938334][T12897] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 17:45:39 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xb00, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 867.031119][T12911] device ifb0 entered promiscuous mode 17:45:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r2 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(r2, 0x11, 0x0, 0x0, 0xffffffd0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(r0, 0x0, 0xffffffac) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) r3 = getuid() sendmsg$nl_xfrm(r2, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000040)={&(0x7f00000018c0)=ANY=[@ANYBLOB="28110000190000072dbd7000fbdbdf25ac1414aa000000000000000000000000000000000000000000000000000000004e2210004e20003f0a0020a02b000000", @ANYRES32=0x0, @ANYRES32=r3, @ANYBLOB="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"], 0x1128}, 0x1, 0x0, 0x0, 0x4040}, 0x4000000) shutdown(r1, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) [ 867.104612][T12911] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 867.127599][T12922] device ifb0 left promiscuous mode [ 867.181414][T12926] kvm_set_msr_common: 2 callbacks suppressed [ 867.181426][T12926] kvm [12916]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:45:40 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 867.244098][T12924] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. [ 867.265613][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 867.351083][T12924] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 17:45:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) recvfrom$rose(r2, &(0x7f0000000200)=""/4096, 0x1000, 0x2, &(0x7f00000000c0)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @null}, 0x1c) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r3 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_tcp_int(r3, 0x6, 0x1f, &(0x7f0000000000), &(0x7f0000000040)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:45:40 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xc00, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 867.459381][T12911] device ifb0 entered promiscuous mode [ 867.465158][T12911] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 867.473357][T12922] device ifb0 left promiscuous mode [ 867.552212][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 867.553740][T12926] kvm [12916]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:45:40 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x4000000000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 867.603605][T12949] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 17:45:40 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x7a00000000000000}) [ 867.740931][T12949] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 17:45:40 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x0, 0x176], [0xc1]}) 17:45:40 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xd00, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 867.907211][T12961] kvm [12960]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 867.984211][T12967] device ifb0 entered promiscuous mode [ 868.003061][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 868.017460][T12967] device ifb0 left promiscuous mode 17:45:40 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x8000000000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:40 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x0, 0x17a], [0xc1]}) 17:45:40 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r2 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r2, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10010}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x50, r3, 0x808, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x3c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x208b}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x800}, 0x20040800) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0x0, 0x10, 0x0, 0xfffffffffffffe00) 17:45:40 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xe00, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 868.214427][T12967] device ifb0 entered promiscuous mode [ 868.258246][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 868.311340][T12991] kvm [12981]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 868.324295][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 868.348614][T12982] device ifb0 left promiscuous mode 17:45:41 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x8200000000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r2 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000000)={0x0, 0x6, 0x1, [0x6]}, &(0x7f0000000040)=0xa) setsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000080)=@assoc_value={r3, 0x7b0c}, 0x8) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:45:41 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xf26, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 868.543265][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:45:41 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x100000000000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:41 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0xc3ffffff00000000}) 17:45:41 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x0, 0x17b], [0xc1]}) 17:45:41 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1020, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 868.810073][T13022] device ifb0 entered promiscuous mode [ 868.828378][T13022] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 868.887353][T13028] device ifb0 left promiscuous mode 17:45:41 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x200000000000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 868.934788][T13034] kvm [13025]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 869.078106][T13022] device ifb0 entered promiscuous mode [ 869.114852][T13022] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:45:41 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1100, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:41 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x0, 0x186], [0xc1]}) [ 869.135795][T13028] device ifb0 left promiscuous mode 17:45:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) r2 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r2, 0x40045542, &(0x7f0000000080)=0x100000000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000000)={{0xa, 0x4e21, 0x1000, @local, 0x3ff}, {0xa, 0x4e24, 0x80000000, @loopback, 0x6}, 0x2, [0x5, 0x1, 0x9, 0x8, 0x100000001, 0x1, 0x9, 0x489e]}, 0x5c) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:45:41 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x300000000000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 869.312294][T13058] kvm [13048]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:45:42 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1200, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 869.354418][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:45:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) r2 = dup3(r1, r1, 0x80000) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x3, 0x125800) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x255) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='illinois\x00', 0x1c4) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(r3, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:45:42 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x400000000000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 869.545348][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:45:42 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0xffffffff00000000}) 17:45:42 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1f00, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:42 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x0, 0x187], [0xc1]}) [ 869.783667][T13090] device ifb0 entered promiscuous mode [ 869.811651][T13090] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:45:42 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x500000000000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 869.851584][T13095] kvm [13086]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 869.879958][T13090] device ifb0 left promiscuous mode 17:45:42 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:42 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x0, 0x1a0], [0xc1]}) 17:45:42 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x0}) 17:45:42 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x40) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f00000000c0)=@ccm_128={{0x307}, "8401f685c709290a", "7e4f008b4eaf0ef443b59c6cb468b5d0", 'G:&\t', "0d4ed6e0a73a2d88"}, 0x28) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r3 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(r2, 0x11, 0x6f, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_udp_int(r3, 0x11, 0xb, &(0x7f0000000000), &(0x7f0000000040)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(r3, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) accept4(r0, 0x0, 0x0, 0x0) 17:45:43 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x600000000000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:43 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 870.239864][T13121] device ifb0 entered promiscuous mode [ 870.245651][T13121] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 870.257473][T13117] kvm [13114]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 870.346248][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 870.361951][T13126] device ifb0 left promiscuous mode 17:45:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r2 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x261) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r2, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000780)=ANY=[@ANYPTR=&(0x7f0000000000)=ANY=[@ANYRES64], @ANYRES16=r3, @ANYBLOB="08092bbd7000fcdbdf2515000000300005002c0002000800020002000000080001000a0000000800010007000000080001000e00000008000400040000003c0007000c0003000300000000000000080001007d5f000008000200070000000c000300a200000000000000080002008000000008000100ff000000740004000c00010073797a310000000034000700ecff0200d7f9ffff080002000100000008000300ff000000080001000500000008000200ff0700002400070008000100010000000800020001000080080001000c00000008000400d40400000c00010073797a3100000000080002000800020000000000080002000510000004000400080001000700000004000400080001000500000004000400380006000800010003000000040002000400020008000100cd0000000400020004000200080001000500000004000200040002000400020000000000000000006fe70d9b75fdab3009133d87af80c7fc834791acdc290fe8cf542e196dcaa9d27cf5cd2fad30068f3058545c30214627e32c27e921a9d6df7cdb5346736b7d67519cba5ee49b2f0db7529a5bb542d769fb0268b1722d2b3a032223cbf33c869e49118f108d2655cb3fee49552696007a5d7cad110c85ed42861291ef9a500000"], 0x3}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) connect$caif(r2, &(0x7f0000000380)=@dgm={0x25, 0x100000000, 0x401}, 0x18) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:45:43 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2500, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 870.525238][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:45:43 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x700000000000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:43 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x0, 0x1d9], [0xc1]}) [ 870.677115][T13121] device ifb0 entered promiscuous mode [ 870.690851][T13121] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 870.709492][T13126] device ifb0 left promiscuous mode 17:45:43 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x260f, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:43 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x800000000000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 870.837477][T13162] kvm [13156]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:45:43 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x0}) 17:45:43 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @rand_addr, 0xffffffffffffffff}, 0xffffffffffffff1b) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) syz_open_dev$usb(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x5, 0x100) syz_open_dev$swradio(&(0x7f0000000880)='/dev/swradio#\x00', 0x1, 0x2) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/sequencer\x00', 0x0, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(r2, 0x0, 0x804000) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r3 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r3, 0x84, 0x3, &(0x7f0000000000)=0x3, 0x4) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) r4 = semget(0x2, 0x3, 0xde) semctl$IPC_INFO(r4, 0x0, 0x3, &(0x7f0000000040)=""/120) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(r3, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f00000000c0), 0x0, 0x200000013, 0x0, 0x0) 17:45:43 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x900000000000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:43 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2801, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 871.152795][T13181] device ifb0 entered promiscuous mode 17:45:43 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x0, 0x1fc], [0xc1]}) [ 871.207399][T13181] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 871.282704][T13186] device ifb0 left promiscuous mode [ 871.313655][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:45:44 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$can_raw(r0, &(0x7f0000000380)={&(0x7f0000000280)={0x1d, r1}, 0x10, &(0x7f0000000340)={&(0x7f00000002c0)=@canfd={{0x1, 0x3, 0xfba, 0x7f}, 0x12, 0x2, 0x0, 0x0, "0fa90bdc335a8e7b0947765b17759aac247a6e5b2b3b33e8c612b2f7d243124b801395a42f297fb86b737da030e1fabc4feae5a1c8327ee294e8fab2d20e104b"}, 0x48}, 0x1, 0x0, 0x0, 0x8800}, 0x20000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r4 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(r2, 0x0, 0xffffffffffffffe4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2101) getsockname$ax25(r4, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r3, 0x1) sendto(r2, &(0x7f0000000000)="ee52e11810aa06b14d9186bde9acdd998856ba5d40a18b592ac90860483c9b33bc2a59792aa61c52b94efe3eecf2b80720aa941bcb37a9f92cde400f6eb5fa4ca3d9d82cff3e949d09c2bed6f71c0b4b93cd1b4b45480d96de76e085a8683500f353de41a32eddad28fecd9b94f036e3d7221a6dd477a6b63ad32460eb9197b691108d183166858b17f5296cc49578f18605c35ef3556cdbce0aa5430b848633637ff46869c829807472b0a1c9c082ed97f0aee990dc7544fdbfa18079922840d07049451142ec13ca03e85c2df7fa75fc5fcc8f7ccf2d7ac973dd6daac47d612019bc9a47d7087690f773dbb1a625a8eb908e3d0f15a6e0", 0xf8, 0x1, &(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x3, 0x0, 0x0, 0x0, {0xa, 0x4e22, 0x6, @mcast1, 0x64e}}}, 0x80) r5 = accept4(r2, 0x0, 0x0, 0x0) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:45:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r2 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(r2, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) [ 871.436152][T13203] kvm [13195]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 17:45:44 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xa00000000000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 871.533052][T13181] device ifb0 entered promiscuous mode [ 871.595032][T13181] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 871.603056][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 871.626955][T13186] device ifb0 left promiscuous mode 17:45:44 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2901, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:44 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xb00000000000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x0, 0x277], [0xc1]}) 17:45:44 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x0}) 17:45:44 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2a01, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:44 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xc00000000000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 872.026406][T13239] device ifb0 entered promiscuous mode [ 872.036405][T13239] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 872.092082][T13243] device ifb0 left promiscuous mode 17:45:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x0, 0x480], [0xc1]}) 17:45:45 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x3f00, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:45 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xd00000000000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 872.354127][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:45:45 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x9, 0x0, 0x6, 0x82020, 0xb, 0x0, 0x8001, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0xf53, 0x80000001, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x2, 0x0, 0x75, 0x5, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 872.404073][T13239] device ifb0 entered promiscuous mode [ 872.446050][T13239] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:45:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r2 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) recvfrom$inet(r2, &(0x7f0000000000)=""/52, 0x34, 0x100, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(r2, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:45:45 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x0, 0x481], [0xc1]}) [ 872.490761][T13243] device ifb0 left promiscuous mode [ 872.623729][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:45:45 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x4000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:45 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x0}) 17:45:45 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xe00000000000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:45 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x9, 0x0, 0x6, 0x82020, 0xb, 0x0, 0x8001, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0xf53, 0x80000001, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x2, 0x0, 0x75, 0x5, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 872.859749][T13293] __ntfs_error: 4 callbacks suppressed [ 872.859758][T13293] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 17:45:45 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x0, 0x482], [0xc1]}) [ 873.009149][T13293] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. [ 873.058983][T13309] device ifb0 entered promiscuous mode [ 873.094190][T13309] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 873.152081][T13311] device ifb0 left promiscuous mode 17:45:45 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x4800, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:45 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x2) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x7fe, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000001180)="11dca5055e0bcfec7be070") 17:45:45 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 873.388917][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 873.407171][T13324] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 17:45:46 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x0, 0x483], [0xc1]}) 17:45:46 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x2) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x7fe, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000001180)="11dca5055e0bcfec7be070") [ 873.465878][T13309] device ifb0 entered promiscuous mode [ 873.493548][T13309] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:45:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0xe, 0xfafc, {{0x19000000, 0x0, 0x0, @rand_addr="27909b2d67ac0dcded3ed7eeca670d08"}, {0xa, 0x0, 0x0, @mcast1}, r2}}, 0x48) listen(r0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(r3, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) accept4(r3, &(0x7f0000000000)=@sco, &(0x7f0000000080)=0x80, 0x80000) [ 873.522979][T13311] device ifb0 left promiscuous mode 17:45:46 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x4c00, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:46 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000000000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 873.718643][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 873.825759][T13351] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 17:45:46 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x200000000a, 0xffffffffffffffff) r2 = fcntl$dupfd(r1, 0xa, 0xffffffffffffffff) sendmsg$unix(r0, &(0x7f0000001640)={&(0x7f0000000040)=@abs, 0x8, &(0x7f0000001580)=[{&(0x7f0000000380)="03fdf0b19dcc2e3814a6a6e05f800593eb58ec386445a0c127be1d5117934cc95c61485c001f61cb390ee4c217d8480953b02f2cb21157102ffbb392036075141e885794d0b3296f5de4b7ae49cc072239d4a6c283c4998256b7b29d3a578807f83defa0440261aaeaa81dedf19397e77935e909c630db78db60a9590157e645268177f5795c1d2675bf9e754cd7dbe1180376bb962df4b92503b04c5e8b092c088e7b075f154b2a37e6344ce6edf0e3c6a8f93e8bf2d721de9bd8ec", 0xbc}], 0x1, 0x0, 0x0, 0x8}, 0x1) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) bind$unix(r4, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r4, 0x0) connect$unix(r3, &(0x7f0000000440)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r5 = accept$inet(r4, 0x0, 0x0) fcntl$getown(r1, 0x5) faccessat(r2, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x100) sendto(r5, &(0x7f0000000040), 0xfe81, 0x0, 0x0, 0x100000118) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) msgget(0x1, 0x8) dup2(0xffffffffffffffff, 0xffffffffffffffff) getpeername$inet(r2, 0x0, 0x0) fchmod(r0, 0x4c) socket$unix(0x1, 0x0, 0x0) 17:45:46 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x0}) 17:45:46 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x0, 0x484], [0xc1]}) 17:45:46 executing program 3: socket$unix(0x1, 0x5, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x200000000a, 0xffffffffffffffff) recvfrom(r1, &(0x7f0000000080)=""/80, 0x50, 0x1, 0x0, 0x0) fcntl$dupfd(r1, 0xa, 0xffffffffffffffff) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r3, 0x0) connect$unix(r2, &(0x7f0000000440)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r4 = accept$inet(r3, 0x0, 0x0) sendto(r4, &(0x7f0000000040), 0xfe81, 0x0, 0x0, 0x100000118) getsockopt$sock_cred(r1, 0xffff, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) fcntl$setstatus(r0, 0x4, 0xbffffffbffc00002) [ 874.013153][T13365] device ifb0 entered promiscuous mode [ 874.019432][T13365] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:45:46 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1100000000000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:46 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x5c00, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 874.055372][T13365] device ifb0 left promiscuous mode 17:45:47 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x200000000a, 0xffffffffffffffff) fcntl$dupfd(r1, 0xa, 0xffffffffffffffff) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r3, 0x0) connect$unix(r2, &(0x7f0000000440)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r4 = accept$inet(r3, 0x0, 0x0) sendto(r4, &(0x7f0000000040), 0xfe81, 0x0, 0x0, 0x100000118) rmdir(0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fsync(0xffffffffffffffff) [ 874.313304][T13365] device ifb0 entered promiscuous mode [ 874.320629][T13365] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 874.360465][T13387] device ifb0 left promiscuous mode 17:45:47 executing program 3: r0 = socket(0x18, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x200000000a, 0xffffffffffffffff) fcntl$dupfd(r1, 0x4000000000a, 0xffffffffffffffff) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r3, 0x0) connect$unix(r2, &(0x7f0000000440)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r4 = accept$inet(r3, 0x0, 0x0) sendto(r4, &(0x7f0000000040), 0xfe81, 0x0, 0x0, 0x100000118) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) geteuid() 17:45:47 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x6800, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 874.504054][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:45:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r2 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(r2, 0x11, 0x0, 0x0, 0xfffffffffffffc27) accept4$alg(r2, 0x0, 0x0, 0xffffffffffbffffe) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x80000, 0x0) ioctl$TIOCSBRK(r3, 0x5427) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:45:47 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1200000000000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:47 executing program 3: r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0xfd87) fallocate(r0, 0x0, 0x0, 0x2008) [ 874.671313][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:45:47 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x0}) 17:45:47 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x0, 0x485], [0xc1]}) 17:45:47 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) socket$rxrpc(0x21, 0x2, 0x2) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000200)={0xfffffffffffffdef, 0x0, 0x0, 0x8, 0x0, r0, 0x0}]) 17:45:47 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x6c00, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 874.842118][T13431] device ifb0 entered promiscuous mode 17:45:47 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1f00000000000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 874.907468][T13431] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 874.948575][T13436] device ifb0 left promiscuous mode [ 875.159153][T13431] device ifb0 entered promiscuous mode [ 875.165125][T13431] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready 17:45:47 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x7400, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 875.209424][T13436] device ifb0 left promiscuous mode 17:45:47 executing program 3: mkdir(&(0x7f000002b000)='./file0\x00', 0x0) creat(&(0x7f0000000500)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f00000001c0)='./file0/bus\x00', 0x0, 0x0) fcntl$lock(r0, 0x26, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000080)) 17:45:48 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000000000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 875.391052][ T26] audit: type=1804 audit(1561398348.115:41): pid=13465 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir687440621/syzkaller.Ev8uml/1493/file0/bus" dev="sda1" ino=17619 res=1 17:45:48 executing program 3: r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000440)={0x40}) [ 875.425134][ T26] audit: type=1804 audit(1561398348.145:42): pid=13466 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir687440621/syzkaller.Ev8uml/1493/file0/bus" dev="sda1" ino=17619 res=1 [ 875.469232][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:45:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r0, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) 17:45:48 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x0, 0x486], [0xc1]}) 17:45:48 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x0}) 17:45:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003a0081aee4050cecdb4cb9040a485e510befccdf7f3e9cf0758ef900e1cf3aebb1cb4c100c0003720000", 0x2e}], 0x1}, 0x0) 17:45:48 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x7a00, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 875.668983][T13483] device ifb0 entered promiscuous mode [ 875.697920][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 875.699912][T13483] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 875.769532][T13483] device ifb0 left promiscuous mode 17:45:48 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010000000000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:48 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xe0ff, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x4}]}]}}, &(0x7f0000000200)=""/245, 0x32, 0xf5, 0x1}, 0x20) 17:45:48 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x79, 0x0, [0x40000104, 0x0, 0x487], [0xc1]}) [ 876.056058][T13483] device ifb0 entered promiscuous mode [ 876.081758][T13483] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 876.093029][T13512] device ifb0 left promiscuous mode 17:45:48 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2500000000000000, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) 17:45:48 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xedc0, &(0x7f0000001500)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-monitor\x00'}}]}) [ 876.230772][T13523] kasan: CONFIG_KASAN_INLINE enabled [ 876.236299][T13523] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 876.301295][T13523] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 876.308287][T13523] CPU: 0 PID: 13523 Comm: syz-executor.3 Not tainted 5.2.0-rc5+ #5 [ 876.316176][T13523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 876.326267][T13523] RIP: 0010:btf_struct_resolve+0x42d/0xfc0 [ 876.332073][T13523] Code: e8 03 42 80 3c 28 00 4d 89 e7 74 08 48 89 df e8 a9 5b 25 00 4c 8b 23 49 8d 5c 24 04 48 89 d8 48 c1 e8 03 48 89 85 68 ff ff ff <42> 0f b6 04 28 84 c0 48 8b 55 c8 0f 85 19 04 00 00 4c 8d 6a fc 48 [ 876.351675][T13523] RSP: 0018:ffff888050f775f0 EFLAGS: 00010247 [ 876.357732][T13523] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000040000 [ 876.365693][T13523] RDX: ffffc9000c621000 RSI: 00000000000008b4 RDI: 00000000000008b5 [ 876.373657][T13523] RBP: ffff888050f77690 R08: ffffffff81897f28 R09: fffffbfff1178ed9 [ 876.381647][T13523] R10: fffffbfff1178ed9 R11: 1ffffffff1178ed8 R12: 0000000000000000 [ 876.389632][T13523] R13: dffffc0000000000 R14: ffff8880a11ed180 R15: ffff88808ace88c0 [ 876.397634][T13523] FS: 00007f69da65e700(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 876.406577][T13523] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 876.413158][T13523] CR2: 00007f5fe4057518 CR3: 00000000857ab000 CR4: 00000000001426f0 [ 876.421123][T13523] Call Trace: [ 876.424416][T13523] btf_resolve+0x3ed/0xda0 [ 876.428836][T13523] ? btf_sec_info_cmp+0x110/0x110 [ 876.433848][T13523] ? kasan_kmalloc+0x9/0x10 [ 876.438344][T13523] ? __kmalloc_node+0x4d/0x60 [ 876.443027][T13523] btf_new_fd+0x216a/0x37b0 [ 876.447535][T13523] ? __might_fault+0xf9/0x160 [ 876.452200][T13523] ? btf_release+0xd0/0xd0 [ 876.456603][T13523] __do_sys_bpf+0x1212/0xc5d0 [ 876.461269][T13523] ? tomoyo_file_ioctl+0x23/0x30 [ 876.466206][T13523] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 876.472272][T13523] ? __bfs+0x550/0x550 [ 876.476331][T13523] ? __lock_acquire+0xcf7/0x1a40 [ 876.481291][T13523] ? __bpf_prog_put_rcu+0x320/0x320 [ 876.486480][T13523] ? __lock_acquire+0xcf7/0x1a40 [ 876.491414][T13523] ? trace_lock_acquire+0x190/0x190 [ 876.496601][T13523] ? kasan_check_read+0x11/0x20 [ 876.501438][T13523] ? do_raw_spin_unlock+0x49/0x260 [ 876.506541][T13523] ? __might_fault+0xf9/0x160 [ 876.511209][T13523] ? kasan_check_read+0x11/0x20 [ 876.516053][T13523] ? _copy_to_user+0xca/0xf0 [ 876.520628][T13523] ? put_timespec64+0x106/0x150 [ 876.525463][T13523] ? ktime_get_raw+0xf0/0xf0 [ 876.530046][T13523] ? prepare_exit_to_usermode+0x1e1/0x4f0 [ 876.535746][T13523] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 876.541364][T13523] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 876.546810][T13523] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 876.552524][T13523] ? do_syscall_64+0x1d/0x140 [ 876.557195][T13523] __x64_sys_bpf+0x7a/0x90 [ 876.561602][T13523] do_syscall_64+0xfe/0x140 [ 876.566095][T13523] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 876.571972][T13523] RIP: 0033:0x4592c9 [ 876.575939][T13523] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 876.595538][T13523] RSP: 002b:00007f69da65dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 876.603962][T13523] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004592c9 [ 876.611919][T13523] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000012 [ 876.619892][T13523] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 876.627935][T13523] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69da65e6d4 [ 876.635888][T13523] R13: 00000000004bf4d3 R14: 00000000004d0aa0 R15: 00000000ffffffff [ 876.643850][T13523] Modules linked in: 17:45:49 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00\x00\x00\x00l\x00', 0x0}) [ 876.658221][T13528] kobject: 'loop0' (000000008552cd9d): kobject_uevent_env [ 876.664539][T13523] ---[ end trace ded0c1aa85965973 ]--- [ 876.666290][T13528] kobject: 'loop0' (000000008552cd9d): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 876.676773][T13523] RIP: 0010:btf_struct_resolve+0x42d/0xfc0 [ 876.689752][T13518] kobject: 'kvm' (0000000015da02b8): kobject_uevent_env [ 876.696752][T13518] kobject: 'kvm' (0000000015da02b8): fill_kobj_path: path = '/devices/virtual/misc/kvm' 17:45:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e24}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x100, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, 0x0, 0x23d) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) bind$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0xfffffffffffffe50) shutdown(r1, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) r4 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xc989, 0x404040) write$FUSE_IOCTL(r4, &(0x7f0000000040)={0x20, 0x0, 0x2, {0x7fff, 0x4, 0x7, 0xffffffff}}, 0x20) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x10, 0x0, 0xffffffffffffff0f) [ 876.697904][T13523] Code: e8 03 42 80 3c 28 00 4d 89 e7 74 08 48 89 df e8 a9 5b 25 00 4c 8b 23 49 8d 5c 24 04 48 89 d8 48 c1 e8 03 48 89 85 68 ff ff ff <42> 0f b6 04 28 84 c0 48 8b 55 c8 0f 85 19 04 00 00 4c 8d 6a fc 48 [ 876.731195][T13523] RSP: 0018:ffff888050f775f0 EFLAGS: 00010247 [ 876.737489][T13523] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000040000 [ 876.746506][T13523] RDX: ffffc9000c621000 RSI: 00000000000008b4 RDI: 00000000000008b5 [ 876.755162][T13527] kobject: 'loop1' (00000000d2b4d21c): kobject_uevent_env [ 876.762553][T13523] RBP: ffff888050f77690 R08: ffffffff81897f28 R09: fffffbfff1178ed9 [ 876.771562][T13527] kobject: 'loop1' (00000000d2b4d21c): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 876.782269][T13523] R10: fffffbfff1178ed9 R11: 1ffffffff1178ed8 R12: 0000000000000000 [ 876.800425][ T3879] kobject: 'loop5' (0000000080880cde): kobject_uevent_env [ 876.801594][T13523] R13: dffffc0000000000 R14: ffff8880a11ed180 R15: ffff88808ace88c0 [ 876.807608][ T3879] kobject: 'loop5' (0000000080880cde): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 876.826552][T13528] kobject: 'loop0' (000000008552cd9d): kobject_uevent_env [ 876.827620][T13522] kobject: 'kvm' (0000000015da02b8): kobject_uevent_env [ 876.833990][T13528] kobject: 'loop0' (000000008552cd9d): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 876.845795][T13537] device ifb0 entered promiscuous mode [ 876.851850][T13523] FS: 00007f69da65e700(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 876.858816][ T3879] kobject: 'loop4' (0000000086d6d92d): kobject_uevent_env [ 876.869042][T13523] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 876.876046][T13537] IPv6: ADDRCONF(NETDEV_CHANGE): ifb0: link becomes ready [ 876.880085][T13527] kobject: 'loop1' (00000000d2b4d21c): kobject_uevent_env [ 876.887976][T13522] kobject: 'kvm' (0000000015da02b8): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 876.894061][T13523] CR2: 00007ffd43a30f38 CR3: 00000000857ab000 CR4: 00000000001426e0 [ 876.907036][ T3879] kobject: 'loop4' (0000000086d6d92d): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 876.911964][T13523] Kernel panic - not syncing: Fatal exception [ 876.922386][T13527] kobject: 'loop1' (00000000d2b4d21c): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 876.929412][T13523] Kernel Offset: disabled [ 876.955573][T13523] Rebooting in 86400 seconds..