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", 0x1000, 0xd8}, {&(0x7f00000027c0)="5b480d1e09e718b594589996ae6f39baa39d363ecbd5be099af889ad54432a2365b99f014131eb5f61", 0x29, 0x3}, {&(0x7f0000002800)="952f6583c3fbfc7b2a330731f135f398c7873af2da600b7cfa16180fc3100a16339a4996386d919e01beb6048992e6388390736e23bb31888505ccf681b38308f7e03b725040c612093aca5229af4c26e7b506a38e28c6e08dbe3dcf47f6b7df0c5bc36efc88824b65dc8db0870059b81305082dcbfe660af2c4ba534c46816672c460d12aee5c4aa8ad8aed7a869dcdf310b39e3d4d87520709e59d068f9d04cf4fcfe2ee9aa1d2b26478fed9d1", 0xae, 0x79f4}], 0x800000, &(0x7f00000029c0)={[{@nointegrity='nointegrity', 0x2c}, {@quota='quota', 0x2c}, {@quota='quota', 0x2c}, {@umask={'umask', 0x3d, [0x35]}, 0x2c}]}) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r3, 0x4010ae74, &(0x7f0000000440)={0x3, 0x8002, 0x1}) open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x8) [ 1316.591401] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:31 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x400000000000000, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:31 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000fffffdfd0000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) [ 1316.667342] ISOFS: Unable to identify CD-ROM format. 07:30:31 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) 07:30:31 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x1d5f0c00]}, 0x6) 07:30:31 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x10) 07:30:31 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0xedc0, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0xdd17, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000000)=0x3) [ 1316.760476] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:31 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x600000000000000, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:31 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000000000000000100000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:31 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x41e8bbbda7c42e2a, &(0x7f0000000000)="0d2cbea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) 07:30:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, "0000000000000000000000000000000000000000000000000000000000000006", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:31 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x4002]}, 0x6) [ 1316.897223] ISOFS: Unable to identify CD-ROM format. 07:30:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0xdd17, &(0x7f0000000100)="f754bea0c4d7") iopl(0x3ff) sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="ceff00002e00fd060000000000000000030000000c00000008000900000000008d583a00000000000000000093ce1dca685d6fb63fc532596b9384bc23011fb25786a8b00a356c0007e89b488f3414601b531be41a584bdb38038d4948cde8d1abbd22da808e899d028851e7a0b17bf4a17b8c31d60a62fb53817d9135183e1d48a4b0a3dfc04f028c5a8173b69651d4e99fc7958ba4575469919f721c74d3eae6e9b977c8b3f6e38e7a41aac49304affd0db5a3e2552bb71e6d3cd0c15583e9590f688df46c558de8bc91d700433a58bc0990ba8d26b44f00c750bcf726cf894f1ff046f424bc2aa338b35873b20b32cb4655a39b44e1437968c1acf5fb8d13f7bf0d303740c7b184e8eb58380d3245899e59cd551e1304f31d08c9434baab3a63fd9b6cffeeac0347fbfa2534e"], 0x1}, 0x1}, 0x0) 07:30:31 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="1941b722a7a6d34535fd5182f8076d368b2cb0c9625ca1f01e1308cdf807c3ad1119b66ba934fbaf617d53c629cd4a70462ec085165dc16b3e3792a7fc796eca0273b16b7081451731822a058184dc3f1262cb522db8c40ed534337e3746b6c91d5b0e7044e4af3596c29a5aab078c04463d4e5a6dd03fafa3232875ba90d49f90bdf430e98c0908a0e30d48efe0c58baade4b91d4124f25db0dff1e8e6c57aa14d93c91afa441cd8a9793e488383a97bbcb38e983843814200cca6c2cae99120fcba0ffb0016974457bc8d322cf92d5a653a33f77075e046c0aa5778e29789fff1d170eddc5002433b527ef2be8e85043015f89cdea881d9855b2047fdcef0e9d8c50e9fed623ecebd2e45ffd45425753b4bf8350b303ccec3701d86ff877d83b5570f1e9cf1f06bd6393070b6c09b09fc35b3b95eb3101d339be266ba2a3e8c05b5b0457aebc111fafea3e12b609732c0a64ad89bba1cd4bf36458cfa4f84f43f45a9f05ed89c01214bdd686683c2fd1187a29f3fa20b75cf2acf486154d967b6062d14ab847fb73e08e9984d058d1fddefeaf73c749b3eed06d9007180a0251cf2eddd2678d175828ba09c90884c4687cbb75e7f06f06ac2c8f5ebb502778444c24c80ca0e1415cf8a2cbe248d4fd712afb33bf4d44206089b2ce0fbf710b409fce14271f2085687e3b93ad84a2894a63d90bd63a7258918f0dbd225f58", 0x1ff, 0x1}], 0x6000, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) [ 1316.953707] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1317.085637] ISOFS: Unable to identify CD-ROM format. 07:30:31 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x142800]}, 0x10) 07:30:31 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x6c26000000000000, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0xdd17, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x2, 0x8000) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f0000000040)) 07:30:31 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x3e8]}, 0x6) 07:30:31 executing program 6: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x82ce, 0x100) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x6908000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="040328bd7000fddbdf65030000000800030000000000080003002f000000080004000100000004000500"], 0x30}, 0x1, 0x0, 0x0, 0x4000}, 0x40) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r2, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x0) 07:30:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:31 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0xffffffffffffff7f, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:31 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a000000000000004c0000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, "00000000000000000000000000000000000000000000000000000000000600", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) [ 1317.195995] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:31 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0xff0f0000, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0xdd17, &(0x7f0000000100)="f754bea0c4d7") r1 = socket$netlink(0x10, 0x3, 0x10000000004) write(r1, &(0x7f00000000c0)="2700000014000704030e0000121f0a001100eda5ca922f4047950700d501005e4775fe0012ff00", 0x27) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) setitimer(0x2, &(0x7f0000000040)={{r2, r3/1000+30000}, {0x77359400}}, &(0x7f0000000080)) r4 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x4, 0x400400) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000140)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000200)={0x0}) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f00000002c0)={0x7c, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="03630840", @ANYRES64=r5, @ANYBLOB="0f630c4003000000010000000000000011634840030000000000000002000000000000000000000010000000000000000000000038000000000000000800000000000000", @ANYPTR=&(0x7f0000000180)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r1, @ANYBLOB="0000000004000000000000008561646600000000000000000000000000000000000000000400000000000000"], @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB='(\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='A\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES64=r6, @ANYBLOB="0400000000000000"], 0x44, 0x0, &(0x7f0000000480)="768ca2151c743d2ffb2a80128b56179d36b2b44b62f9391c5476f1009750563f9a29091ef647e8aecc66d73b147be79fce8be15b06b25b8add1379d0cf015e8c7cb48295"}) sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r4, 0xc008640a, &(0x7f0000000500)={0x0}) ioctl$DRM_IOCTL_GEM_CLOSE(r4, 0x40086409, &(0x7f0000000540)={r7}) 07:30:31 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) ppoll(&(0x7f0000000000)=[{r0, 0x8}, {r0, 0x4}, {r0, 0x1050}, {r0, 0x40}, {r0, 0x8000}, {r0, 0x2000}, {r0, 0x4000}], 0x7, &(0x7f0000000040)={0x77359400}, &(0x7f0000000080)={0x1000}, 0x8) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) unshare(0x0) 07:30:31 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a000000000000006c0000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:31 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0xffffff80]}, 0x6) [ 1317.277469] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1317.304700] ISOFS: Unable to identify CD-ROM format. 07:30:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) [ 1317.435285] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:32 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0xf5ffffff00000000, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:32 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x10c, &(0x7f0000002a80)=[{&(0x7f0000001a80)="19414e544653202020205182f8076d368b2cb0c9625ca1f01e1308cdf807c3ad1119b66ba934fbaf617d53c629cd4a70462ec085165dc16b3e3792a7fc796eca0273b16b7081451731822a058184dc3f1262cb522db8c40ed534337e3746b6c91d5b0e7044e4af3596c29a5aab078c04463d4e5a6dd03fafa3232875ba90d49f90bdf430e98c0908a0e30d48efe0c58baade4b91d4124f25db0dff1e8e6c57aa14d93c91afa441cd8a9793e488383a97bbcb38e983843814200cca6c2cae99120fcba0ffb0016974457bc8d322cf92d5a653a33f77075e046c0aa5778e29789fff1d170eddc5002433b527ef2be8e85043015f89cdea881d9855b2047fdcef0e9d8c50e9fed623ecebd2e45ffd45425753b4bf8350b303ccec3701d86ff877d83b5570f1e9cf1f06bd6393070b6c09b09fc35b3b95eb3101d339be266ba2a3e8c05b5b0457aebc111fafea3e12b609732c0a64ad89bba1cd4bf36458cfa4f84f43f45a9f05ed89c01214bdd686683c2fd1187a29f3fa20b75cf2acf486154d967b6062d14ab847fb73e08e9984d058d1fddefeaf73c749b3eed06d9007180a0251cf2eddd2678d175828ba09c90884c4687cbb75e7f06f06ac2c8f5ebb502778444c24c80ca0e1415cf8a2cbe248d4fd712afb33bf4d44206089b2ce0fbf710b409fce14271f2085687e3b93ad84a2894a63d90bd63a7258918f0dbd225f58", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:32 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}, 0x10) 07:30:32 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0xdd17, &(0x7f0000000100)="f754bea0c4d7") r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/netstat\x00') setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000040)=0x1, 0x4) sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="ceff00002e00fd060000000000000000030000000c00000008000900000000008d583a00000000000000000093ce1dca685d6fb63fc532596b9384bc23011fb25786a8b00a356c0007e89b488f3414601b531be41a584bdb38038d4948cde8d1abbd22da808e899d028851e7a0b13e1d48a4b0a3dfc04f028c5a8173b69651d4e99fc7958ba4575469919f721c74d3eae6e9b977c8b3f6e38e7a41aac49304affd4a311ea5552bb71e6d3cd0c15583e9590f688df46c558de8bc91d700433a58bc0990ba8d26b44f00c750bcf726cf894f1ff046f424bc2aa338a39b44e1437968c1acf5fb8d13f7bf0d303740c7b184e8eb58380d3245899e59cd551e1304f31d08c9434baab3a63fd9b6cffeeac0347fbfa2534e7b27acab45c7c44bc5"], 0x1}, 0x1}, 0x0) 07:30:32 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") syz_emit_ethernet(0x36, &(0x7f0000000280)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv4={0x8864, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @remote={0xac, 0x14, 0x14, 0xbb}}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, &(0x7f0000000100)={0x0, 0x3, [0x0, 0x5cd]}) sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="ceff00002e00fd060000000000000000030000000c00000008000900000000008d583a00000000000000000093ce1dca685d6fb63fc532596b9384bc23011fb25786a8b00a356c0007e89b488f3414601b531be41a584bdb38038d4948cde8d1abbd22da808e899d028851e7a0b13e1d48a4b0a3dfc04f028c5a8173b69651d4e99fc7958ba4575469919f721c74d3eae6e9b977c8b3f6e38e7a41aac49304affd4a311ea5552bb71e6d3cd0c15583e9590f688df46c558de8bc91d700433a58bc0990ba8d26b44f00c750bcf726cf894f1ff046f424bc2aa338a39b44e1437968c1acf5fb8d13f7bf0d303740c7b184e8eb58380d3245899e59cd551e1304f31d08c9434baab3a63fd9b6cffeeac0347fbfa2534e7b27acab45c7c44bc5"], 0x1}, 0x1}, 0x0) keyctl$set_reqkey_keyring(0xe, 0x7) 07:30:32 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000480000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:32 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x195f0c0000000000]}, 0x6) 07:30:32 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) [ 1317.551859] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:32 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x7ffffff9, &(0x7f0000002a80)=[{&(0x7f0000001a80)="19414e544653202020205182f8076d368b2cb0c9625ca1f01e1308cdf807c3ad1119b66ba934fbaf617d53c629cd4a70462ec085165dc16b3e3792a7fc796eca0273b16b7081451731822a058184dc3f1262cb522db8c40ed534337e3746b6c91d5b0e7044e4af3596c29a5aab078c04463d4e5a6dd03fafa3232875ba90d49f90bdf430e98c0908a0e30d48efe0c58baade4b91d4124f25db0dff1e8e6c57aa14d93c91afa441cd8a9793e488383a97bbcb38e983843814200cca6c2cae99120fcba0ffb0016974457bc8d322cf92d5a653a33f77075e046c0aa5778e29789fff1d170eddc5002433b527ef2be8e85043015f89cdea881d9855b2047fdcef0e9d8c50e9fed623ecebd2e45ffd45425753b4bf8350b303ccec3701d86ff877d83b5570f1e9cf1f06bd6393070b6c09b09fc35b3b95eb3101d339be266ba2a3e8c05b5b0457aebc111fafea3e12b609732c0a64ad89bba1cd4bf36458cfa4f84f43f45a9f05ed89c01214bdd686683c2fd1187a29f3fa20b75cf2acf486154d967b6062d14ab847fb73e08e9984d058d1fddefeaf73c749b3eed06d9007180a0251cf2eddd2678d175828ba09c90884c4687cbb75e7f06f06ac2c8f5ebb502778444c24c80ca0e1415cf8a2cbe248d4fd712afb33bf4d44206089b2ce0fbf710b409fce14271f2085687e3b93ad84a2894a63d90bd63a7258918f0dbd225f58", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:32 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0xdd17, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20000, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f0000000480)=""/4096) 07:30:32 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x440000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000340)={0x1014, 0x1d, 0xb04, 0x70bd2b, 0x25dfdbfe, {0xe}, [@generic="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"]}, 0x1014}, 0x1, 0x0, 0x0, 0x1}, 0x40) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0xa01, 0x0) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000040)=0x3ff) 07:30:32 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0x10) [ 1317.629707] ISOFS: Unable to identify CD-ROM format. 07:30:32 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:32 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000000100000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:32 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0xfbffffff00000000, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:32 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0xf401]}, 0x6) 07:30:32 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r2, 0x40405515, &(0x7f0000000240)={0x7, 0x0, 0xff, 0x2, 'syz1\x00', 0x4}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xe}}}, 0x10000, 0x3f, 0x9, 0xffffffffffff0000, 0x40}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000180)={r3}, &(0x7f00000001c0)=0x8) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) 07:30:32 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x280180, 0x0) ioctl$EVIOCGREP(r1, 0x80084503, &(0x7f0000000040)=""/142) ioctl$sock_bt(0xffffffffffffffff, 0xdd17, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) 07:30:32 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c]}, 0x10) 07:30:32 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x10e, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) [ 1317.887622] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1317.910917] ISOFS: Unable to identify CD-ROM format. 07:30:32 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0xdd17, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) 07:30:32 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000000000000004c00000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:32 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x275f0c0000000000]}, 0x6) 07:30:32 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0xaa040000, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:32 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:32 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0xffff88015296c8f8, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:32 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x400, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x9, 0x100000000, 0x8532, 0x3, 0x6, 0x7, 0x7, 0x10000, 0x1, 0x6, 0x1, 0x5695}) 07:30:32 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) keyctl$set_reqkey_keyring(0xe, 0x0) ioctl$sock_bt(0xffffffffffffffff, 0xdd17, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) fcntl$addseals(r0, 0x409, 0x1) [ 1318.085794] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:32 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56013080]}, 0x10) [ 1318.143867] ISOFS: Unable to identify CD-ROM format. 07:30:32 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000000060000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:32 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, "0000000000000000000000000000000000000000000000000000000000000005", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:32 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0x6) 07:30:32 executing program 6: r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000000)=0x1ff, &(0x7f0000000040)=0x1) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r1, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) [ 1318.239522] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1318.335481] __ntfs_warning: 170 callbacks suppressed [ 1318.335492] ntfs: (device loop7): is_boot_sector_ntfs(): Invalid boot sector checksum. [ 1318.348865] ntfs: (device loop7): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 1318.357306] ntfs: (device loop7): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 1318.369379] ntfs: (device loop7): ntfs_fill_super(): Not an NTFS volume. 07:30:33 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0xab040000, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:33 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a000000000000007a0000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000000)=0x7a13) ioctl$sock_bt(0xffffffffffffffff, 0xdd17, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) 07:30:33 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0xe8030000]}, 0x6) 07:30:33 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) fdatasync(r0) 07:30:33 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, "000000000000000000000000000000000000000000000000000000000200", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:33 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e8]}, 0x10) 07:30:33 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x7, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) [ 1318.470404] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1318.489656] ntfs: (device loop7): is_boot_sector_ntfs(): Invalid boot sector checksum. [ 1318.497850] ntfs: (device loop7): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 1318.506294] ntfs: (device loop7): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 07:30:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0xdd17, &(0x7f0000000100)="f754bea0c4d7") r1 = syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000240)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000280)=0x24) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000002c0)=@assoc_value={r2, 0x81}, &(0x7f0000000340)=0x8) r3 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x3, 0x2) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x23, &(0x7f0000000080)={@broadcast, @dev, 0x0}, &(0x7f00000000c0)=0xc) accept$inet(r1, 0x0, &(0x7f0000000380)) sendmsg$nl_route_sched(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000260000022dbd7000fedbdf2500000000", @ANYRES32=r4, @ANYBLOB="00000000000000002000070004000a0004000800"], 0x2c}, 0x1}, 0x0) sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) [ 1318.518400] ntfs: (device loop7): ntfs_fill_super(): Not an NTFS volume. [ 1318.540580] ISOFS: Unable to identify CD-ROM format. 07:30:33 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x80082, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r1, 0x6430) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) 07:30:33 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0xfeffffff00000000]}, 0x6) 07:30:33 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) [ 1318.574543] ntfs: (device loop7): is_boot_sector_ntfs(): Invalid boot sector checksum. [ 1318.582697] ntfs: (device loop7): read_ntfs_boot_sector(): Primary boot sector is invalid. 07:30:33 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000c0ed00000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) [ 1318.665822] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:33 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, 0x10) 07:30:33 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0xe803]}, 0x6) 07:30:33 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x23000000, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0xdd17, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000040)={&(0x7f0000000480)={0x4f4, 0x32, 0x20, 0x70bd2c, 0x25dfdbfb, {0x3}, [@nested={0x1cc, 0x11, [@generic="133740e2c10ee56fdcbe1d3cafadc1fd61f6b14fded3d1f0cbb47d44fe7309765c700ed71c9514713b602dadad792d8e2e434408058728b94b957d86f948a566d63a4ee8685b4f1f42ba5bb53554fc65642446e4dfca7a4ce9b721f7614688b7eeea1e61edb76f4b56844c7f9d9dfa797f4a29b3fe8562ebad4aa8949fa3656e8a38ef275d868950f5b22c3b9288a488c49d9b12acd3522979a259520af275fb79e58febc28c4e42b09e3a7305fe66e51ee7737b4ad3012bef9432e3", @typed={0x8, 0x8e, @ipv4=@loopback=0x7f000001}, @typed={0xc, 0x3d, @u64=0x40}, @generic="9790bbdd4cb690bae70f4307663a572721660cf583409908d68d07a54f1d11028b4b747f251e0c674546c7e0263ff72f7d138cf4cd3c70b47e2e310b5ec3e2ffaca3cf927f89ba21ff757addc7c53685323007a96cad5975f8b9529011225c502dd11698a1dd532e074f39261efda9032880c5d335e5aa31b6decf9374db9b69dcf1faff225112d427c969d88557ae9c0ca5ab7c5923c90006fd5073030f4daae78f5268b63e9ba96adb73acbca77756a8edd99dcec8eb710fa7115a285351ab13972af95cc3c0afb2357ddf2c56320f5c88b73cf3557fbdd420ebd030d059bf5f3b78e102c92e790ca0dc7c22fa5cafafcff818f0"]}, @nested={0xdc, 0x79, [@generic="33c8e6f50965732752a5c1a433f0018c1541d76e808252ed16fc930ae3029186f266ac31d325e2ec7aa05716cecbc103bdb992b0705e97e11187e5a57af1e8d873c1886e9e4639ea53b8a0b92d058b3e419d69b2412e1d5d5fc854372cec0dff23afbb9e99bcd21e6a991d4b15f7e1bda1b9f0a077e61b2095730a3474a448b3fc20f8a057f2f8e27299a0dd79e4b75a8618a1a7c020b2098676a73ca97623631a50a41e86cf80390fdd1ae687744aaed7943dcc95456ddeee72e0fad475f20dd32ee62142359f26c0f80f6ca947960b07c8cc7ff5c127"]}, @typed={0x4, 0x6f}, @generic="aa446adc360ea3407b26de0cdfd815dc7c4878a2bf9e62de0ea8a758436e9c7e5fb3eb6d7cdb2bd2ed702d036f5a6e99922911c3655295f65d6aa4e5684bc9e37bfc387c01bf1f5926b230c0656bab97b944ca5ff5eb2a18fabb5536a16d62a4b38525f04febd04603d9f5963672d03c8cb12f1b63b64b93cbfb23cffc7ab668d1e8046ca3cfbb7283132f6530a53fdf33c4a9ab723f6d6826f96d09163915bf834d60665d5330746bd3c5c68815c5ddc7a77611a3a4ffa05be363fd56ab21317b42b27f", @nested={0x170, 0x74, [@typed={0x14, 0x44, @ipv6=@dev={0xfe, 0x80, [], 0x15}}, @generic="73742e2799fff87e791b8d99021c07ec6656048f8b834845b172fd01c8efd108964ead5f709a9f08144c8fdccf43218eab4a672caa12b28e260e6d5e478e547725b354156c5a095664519432e03d6569d1c3927ed6037f239883c42e68b7315a41dc4640447eeb296dc62c9da43e1f6339d15868d2efefb3e5126b39476e74c532506a3c720d2574a96a252eba5d8c5631d9a29597884bc1db0dbd7c2c7c36b0b403d5dc07ea3c94581064a66afb39bbbfff01ffaeb2bd0409069512617964c21f3e4a02880d382a2ab6269bc7aa7456655fe84c02ce225c4447874ef7b30c16b2fb2eb15cd1042b9a", @generic="08ec504fd8a17ad3387f5b0fdf1f054fc093cc9ffdaf1110ad8322eaa26731708fa4c4c40909e8385c0ea34031753b853a590effced9efa56c0467ff9f378b9fa9890f84111cc5559b1910c26c2f9d34fb5613a1c7ba2882133186fc3cfda3aa2bddd4c2561326", @typed={0x8, 0x4b, @ipv4=@broadcast=0xffffffff}]}]}, 0x4f4}, 0x1, 0x0, 0x0, 0x800}, 0x24040040) sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="ceff00002e00fd060000000000000000030000000c00000008000900000000008d583a00000000000000000093ce1dca685d6fb63fc532596b9384bc23011fb25786a8b00a356c0007e89b488f3414601b531be41a584bdb38038d4948cde8d1abbd22da808e899d028851e7a0b13e1d48a4b0a3dfc04f028c5a8173b69651d4e99fc7958ba4575469919f721c74d3eae6e9b977c8b3f6e38e7a41aac49304affd4a311ea5552bb71e6d3cd0c15583e9590f688df46c558de8bc91d700433a58bc0990ba8d26b44f00c750bcf726cf894f1ff046f424bc2aa338a39b44e1437968c1acf5fb8d13f7bf0d303740c7b184e8eb58380d3245899e59cd551e1304f31d08c9434baab3a63fd9b6cffeeac0347fbfa2534e7b27acab45c7c44bc5"], 0x1}, 0x1}, 0x0) 07:30:33 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x80, 0x0) getsockopt$packet_buf(r1, 0x107, 0x1, &(0x7f0000000080)=""/75, &(0x7f0000000140)=0x4b) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40000000000}, 0x0) ioctl$DRM_IOCTL_FREE_BUFS(r1, 0x4010641a, &(0x7f00000001c0)={0x6, &(0x7f0000000180)=[0x4, 0x0, 0x4, 0x2, 0x7fff, 0x1]}) 07:30:33 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000600000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:33 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x5900, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:33 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, "000000000000000000000000000000000000000000000000000000000400", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) [ 1318.778840] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:33 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x28100, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(r1, 0xc0206416, &(0x7f00000001c0)={0x8000, 0xf210, 0x8d87, 0x9, 0x8, 0x1ff}) r2 = accept(r0, &(0x7f0000000000)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000080)=0x80) getsockopt$ipx_IPX_TYPE(r2, 0x100, 0x1, &(0x7f00000000c0), &(0x7f0000000140)=0x4) ioctl$sock_bt(0xffffffffffffffff, 0xdd17, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) [ 1318.855562] ISOFS: Unable to identify CD-ROM format. 07:30:33 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3400]}, 0x10) 07:30:33 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000fbffffff0000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:33 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x4000) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x20000, 0x0) ioctl$sock_bt(r2, 0x0, &(0x7f0000000040)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="ceff00002e00fd060000000000000000030000000c00000008000900000000008d583a00000000000000000093ce1dca685d6fb63fc532596b9384bc23011fb25786a8b00a356c0007e89b488f3414601b531be41a584bdb38038d4948cde8d1abbd22da808e899d028851e7a0b13e1d48a4b0a3dfc04f028c5a8173b69651d4e99fc7958ba4575469919f721c74d3eae6e9b977c8b3f6e38e7a41aac49304affd4a311ea5552bb71e6d3cd0c15583e9590f688df46c558de8bc91d700433a58bc0990ba8d26b44f00c750bcf726cf894f1ff046f424bc2aa338a39b44e1437968c1acf5fb8d13f7bf0d303740c7b184e8eb58380d3245899e59cd551e1304f31d08c9434baab3a63fd9b6cffeeac0347fbfa2534e7b27acab45c7c44bc5"], 0x1}, 0x1}, 0x0) 07:30:33 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x1100]}, 0x6) 07:30:33 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x8100, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) [ 1318.923541] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1319.084538] ISOFS: Unable to identify CD-ROM format. 07:30:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0xdd17, &(0x7f0000000100)="f754bea0c4d7") ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000740)=0x0) sched_setattr(r1, &(0x7f0000000780)={0x30, 0x2, 0x0, 0x6, 0xfffffffffffffffe, 0x2, 0x7, 0x400}, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer2\x00', 0x8042, 0x0) ioctl$sock_netrom_TIOCINQ(r2, 0x541b, &(0x7f0000000480)) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vcs\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000280)=@assoc_value={0x0, 0xfff}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000140)={r4, @in6={{0xa, 0x4e22, 0x5, @empty, 0x5a}}, [0xb7c, 0x6, 0xb38f, 0x800, 0xf6, 0x1, 0xdc, 0xfffffffffffffff9, 0x2, 0x1, 0x10193, 0x3, 0x7864, 0x8, 0xa1da]}, &(0x7f0000000240)=0xfffffe1e) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='ipddp0\x00', 0x10) getsockname$ax25(r3, &(0x7f0000000680), &(0x7f00000006c0)=0x10) sendmsg$key(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="020a0109190000002dbd7000fcdbdf2502001300090000002bbd70000235000002000b000400000007000000000000000240020013000000000025bd70000735000007001900000000000a004e2307000000fe8000000000000000000000000000bb0000000002004e23e000000100000000000000000000000008001900000000000a004e2403000000fe800000000000000000000000000010000800000a004e220000000000000000000000000000ffff00000fff00000000"], 0xc8}, 0x1}, 0x1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000440)={0x5, &(0x7f0000000400)=[{0x9, 0xffff, 0xb443, 0x5}, {0xaf, 0xfffffffffffffffe, 0x0, 0x800}, {0x7fffffff, 0x9, 0x10001, 0x5}, {0x0, 0x1554, 0xb89, 0x69}, {0x9, 0x5, 0x4f, 0x1d85}]}, 0x10) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r2, 0x4008ae48, &(0x7f00000005c0)=0x10000) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000700)='net/raw\x00') ioctl$KVM_GET_NR_MMU_PAGES(r5, 0xae45, 0x1) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000600), &(0x7f00000007c0)=0x8) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000640)=@get={0x1, &(0x7f0000000500)=""/159, 0x7f}) ioctl$sock_ipx_SIOCIPXNCPCONN(r3, 0x89e3, &(0x7f0000000000)=0x7) 07:30:33 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000000000000000500000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:33 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x14, &(0x7f0000002a80)=[{&(0x7f0000001a80)="19414e544653202020205182f8076d368b2cb0c9625ca1f01e1308cdf807c3ad1119b66ba934fbaf617d53c629cd4a70462ec085165dc16b3e3792a7fc796eca0273b16b7081451731822a058184dc3f1262cb522db8c40ed534337e3746b6c91d5b0e7044e4af3596c29a5aab078c04463d4e5a6dd03fafa3232875ba90d49f90bdf430e98c0908a0e30d48efe0c58baade4b91d4124f25db0dff1e8e6c57aa14d93c91afa441cd8a9793e488383a97bbcb38e983843814200cca6c2cae99120fcba0ffb0016974457bc8d322cf92d5a653a33f77075e046c0aa5778e29789fff1d170eddc5002433b527ef2be8e85043015f89cdea881d9855b2047fdcef0e9d8c50e9fed623ecebd2e45ffd45425753b4bf8350b303ccec3701d86ff877d83b5570f1e9cf1f06bd6393070b6c09b09fc35b3b95eb3101d339be266ba2a3e8c05b5b0457aebc111fafea3e12b609732c0a64ad89bba1cd4bf36458cfa4f84f43f45a9f05ed89c01214bdd686683c2fd1187a29f3fa20b75cf2acf486154d967b6062d14ab847fb73e08e9984d058d1fddefeaf73c749b3eed06d9007180a0251cf2eddd2678d175828ba09c90884c4687cbb75e7f06f06ac2c8f5ebb502778444c24c80ca0e1415cf8a2cbe248d4fd712afb33bf4d44206089b2ce0fbf710b409fce14271f2085687e3b93ad84a2894a63d90bd63a7258918f0dbd225f58", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:33 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 07:30:33 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0xc5f0d]}, 0x6) 07:30:33 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, "0000000000000000000000000000000000000000000000000000000000000004", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:33 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0xab04000000000000, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:33 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x10) [ 1319.173220] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:33 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0xa00, &(0x7f0000002a80)=[{&(0x7f0000001a80)="19414e544653202020205182f8076d368b2cb0c9625ca1f01e1308cdf807c3ad1119b66ba934fbaf617d53c629cd4a70462ec085165dc16b3e3792a7fc796eca0273b16b7081451731822a058184dc3f1262cb522db8c40ed534337e3746b6c91d5b0e7044e4af3596c29a5aab078c04463d4e5a6dd03fafa3232875ba90d49f90bdf430e98c0908a0e30d48efe0c58baade4b91d4124f25db0dff1e8e6c57aa14d93c91afa441cd8a9793e488383a97bbcb38e983843814200cca6c2cae99120fcba0ffb0016974457bc8d322cf92d5a653a33f77075e046c0aa5778e29789fff1d170eddc5002433b527ef2be8e85043015f89cdea881d9855b2047fdcef0e9d8c50e9fed623ecebd2e45ffd45425753b4bf8350b303ccec3701d86ff877d83b5570f1e9cf1f06bd6393070b6c09b09fc35b3b95eb3101d339be266ba2a3e8c05b5b0457aebc111fafea3e12b609732c0a64ad89bba1cd4bf36458cfa4f84f43f45a9f05ed89c01214bdd686683c2fd1187a29f3fa20b75cf2acf486154d967b6062d14ab847fb73e08e9984d058d1fddefeaf73c749b3eed06d9007180a0251cf2eddd2678d175828ba09c90884c4687cbb75e7f06f06ac2c8f5ebb502778444c24c80ca0e1415cf8a2cbe248d4fd712afb33bf4d44206089b2ce0fbf710b409fce14271f2085687e3b93ad84a2894a63d90bd63a7258918f0dbd225f58", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:33 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0xc5f1f]}, 0x6) 07:30:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0xdd17, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r1, 0x80dc5521, &(0x7f0000000600)=""/122) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x50000, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000006c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x210b400}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0xfffffffffffffc89, r3, 0x302, 0x70bd29, 0x25dfdbfe, {0xc}}, 0x14}, 0x1}, 0x40) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f0000000140)=""/215) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r4, 0x84, 0x16, &(0x7f00000002c0)={0x2, [0x8, 0x9]}, &(0x7f0000000480)=0x8) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="00192abd7000fddbdf1e5c8b4d5401e943fb8eedf29477fec310e7fdd3ff0500030000001800010008000b00736970000c00070007000000000000002b2a050965a41c0ef3e3980343b1672d6da03868f4a0e27ea2"], 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x80) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r4, 0x40a85321, &(0x7f00000004c0)={{0x906, 0x8}, 'port1\x00', 0xa4, 0x20001, 0x3, 0x2, 0x7ff, 0x6, 0xff, 0x0, 0x5, 0x7}) 07:30:33 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcbff0000]}, 0x10) 07:30:33 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000040)={0x7, 0x7, 0x0, 0xe9, 0x100000000}, 0x14) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x9) sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) [ 1319.275699] ISOFS: Unable to identify CD-ROM format. 07:30:33 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:33 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000000000000003f00000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:34 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x4ab, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:34 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x202080, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000040)) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) [ 1319.390183] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) [ 1319.507384] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1319.567529] ISOFS: Unable to identify CD-ROM format. 07:30:34 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x400, 0x0) setsockopt(r0, 0x8, 0x81, &(0x7f0000000040)="32bafac31261ffbade6bfdff05d6bd3f46c3df367b2acf1294208d7353186dc8d184290b0db527e8d0d09e7559fcb8ab27cca34dfbdeef535720c41366a52301cd56106a51e49d90e89172b121e7df8cb792589af23b7a3b69ca142d07a5ed4878bea897a8bd6e65467d7a91e24f445e1e25e20c9af918274582424a8d73b6aea8a973f0684c7d47fb6855efc663b081ad8fe8526562c6d9bce2653bf52f40e9f10581e69dba78c9b23de0603714597dd9d344fd05", 0xb5) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0xdd17, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r1, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) 07:30:34 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0xc5f19]}, 0x6) 07:30:34 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a0000000000000000fffffffb00000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:34 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc900]}, 0x10) 07:30:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:34 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r1, 0x107, 0x0, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000000)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000040)=ANY=[@ANYRES16=r0], 0x1}, 0x1}, 0x0) clock_getres(0x0, &(0x7f0000000180)) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0xffffffffffffff9c, 0x7, 0x1, 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) futimesat(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x0, 0x7530}, {0x77359400}}) 07:30:34 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x4, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:34 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x10, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) [ 1319.688804] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:34 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0xdd17, &(0x7f0000000100)="f754bea0c4d7") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2000, 0x0) ioctl$sock_bt(r1, 0x8906, &(0x7f0000000040)) sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) 07:30:34 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) 07:30:34 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x3, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:34 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000000030000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, "0000000000000000000000000000000000000000000000000000000000000003", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:34 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x80ffffff]}, 0x6) 07:30:34 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62d02]}, 0x10) [ 1319.844135] ISOFS: Unable to identify CD-ROM format. [ 1319.870110] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:34 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0xdd17, &(0x7f0000000100)="f754bea0c4d7") r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xc1e4, 0x2040) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000480)=@mangle={'mangle\x00', 0x1f, 0x6, 0x590, 0x3f8, 0x1f0, 0x100, 0x100, 0x2e8, 0x4f8, 0x4f8, 0x4f8, 0x4f8, 0x4f8, 0x6, &(0x7f0000000040), {[{{@ip={@local={0xac, 0x14, 0x14, 0xaa}, @empty, 0xffffffff, 0xff0000ff, 'team_slave_1\x00', 'veth1_to_bond\x00', {0xff}, {}, 0x0, 0x1, 0x2}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x0, [0x3, 0x100000001, 0x4, 0x2, 0xbe0c, 0x545a5164], 0x6, 0x9}}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00', 0x0, {0x1}}}, {{@ip={@loopback=0x7f000001, @multicast1=0xe0000001, 0xffffffff, 0xffffff00, 'bcsf0\x00', 'bridge_slave_0\x00', {0xff}, {0xff}, 0x8c, 0x2, 0x4}, 0x0, 0xc0, 0xf0, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x9}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x100, 0x40, @remote={0xac, 0x14, 0x14, 0xbb}, 0x4e20}}}, {{@ip={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}, 0xffffff00, 0xffffff00, 'tunl0\x00', 'bpq0\x00', {}, {0xff}, 0x2f, 0x3, 0x4}, 0x0, 0x98, 0xf8}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@rand_addr=0x2, [0x0, 0xffffff00, 0xffffffff, 0xffffffff], 0x4e23, 0x4e21, 0x4e23, 0x4e21, 0x401, 0x1, 0x0, 0x1000}}}, {{@ip={@loopback=0x7f000001, @remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0xffffffff, 'sit0\x00', 'ipddp0\x00', {0xff}, {}, 0x6, 0x2, 0x31}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xc}}]}, @TTL={0x28, 'TTL\x00', 0x0, {0x0, 0x9}}}, {{@uncond, 0x0, 0xc0, 0x100, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x1f, 0x2, @ipv6=@dev={0xfe, 0x80, [], 0x1f}, 0x4e22}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x5f0) sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) 07:30:34 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000500000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, "00000000000000000000000000000000000000000000000000000000000300", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:34 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) r1 = fcntl$getown(r0, 0x9) ptrace$setsig(0x4203, r1, 0x1, &(0x7f0000000000)={0x14, 0x270, 0x2}) 07:30:34 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0xfeffffff00000000, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:34 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0xa, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:34 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000]}, 0x10) 07:30:34 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0xa000000]}, 0x6) [ 1320.040512] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:34 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0xf, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:34 executing program 4: r0 = memfd_create(&(0x7f00000000c0)='userselinux\x00', 0x3) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000140)=0x80000001, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0xdd17, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r1, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) 07:30:34 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) ioctl$sock_bt(r1, 0x541b, &(0x7f0000000040)="262594cd9d79777e0c63dc48f8641dae9f96801bb6bfa94e18de5e081ad07bc65f33690f1eb7d9a9c0e70371b620fbf608ce3a8be56618c11bf854e8a08fa5347c656a6100e9a64272f1f69b56383de7d379883ec8e67352f4cbac76713b7cf20d5e964e6217a66b8962b63c5344e1c37cd19d2c45473339e2446e404f") ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") ioctl$TIOCSTI(r1, 0x5412, 0x6) sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) 07:30:34 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000000000000006c00000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) [ 1320.111206] ISOFS: Unable to identify CD-ROM format. 07:30:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, "0000000000000000000000000000000000000000000000000000000000000002", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:34 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x185f0c00]}, 0x6) 07:30:34 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x700000000000000, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:34 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) [ 1320.207326] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1320.370328] ISOFS: Unable to identify CD-ROM format. 07:30:35 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0xdd19, &(0x7f0000000140)="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") ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000580)=""/212, 0x2}) sendmsg$nl_generic(r0, &(0x7f0000000780)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x401, 0x8000) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000680)={0x0, @in6={{0xa, 0x4e24, 0x81, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x5, 0x1, 0x7fffffff, 0x1, 0x6}, &(0x7f00000002c0)=0x98) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000007c0)={r2, 0x5}, &(0x7f0000000800)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000740)={r2, 0x5, 0x80000001, 0x3, 0x5, 0xfffffffffffffffa}, 0x14) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000080)={&(0x7f0000000480)={0xd8, r3, 0x401, 0x70bd2c, 0x25dfdbfc, {0xf}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4af}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x7f}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x24}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x800}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_SERVICE={0x38, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'lc\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1={0xff, 0x1, [], 0x1}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8ad6}]}, 0xd8}, 0x1, 0x0, 0x0, 0x4048040}, 0x40004) 07:30:35 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x40020000]}, 0x6) 07:30:35 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000]}, 0x10) 07:30:35 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x2, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:35 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, "000000000000000000000000000000000000000000000000000000007fffffff", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:35 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000000000000002300000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:35 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0xffff1f0000000000, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:35 executing program 6: r0 = dup(0xffffffffffffff9c) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000080)={0x0, 0x7530}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") ioctl(r1, 0x7, &(0x7f0000000000)="c363b9a5825d75a17b3b8933963bcac212719e18a5283cd9747d18a8e6b355e13c275939027d84e020681cd4b61378a8134e31c7a3568c1502fc7d91dc26d7ffac632464c4a3db70b385de535673") sendmsg$nl_generic(r1, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) 07:30:35 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) [ 1320.528359] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:35 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x4, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:35 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x78, r1, 0x200, 0x70bd26, 0x25dfdbfd, {0xe}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1ff}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x5}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_SERVICE={0x38, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x2}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0xc, 0x2}}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x6}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xbf}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x9}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x4000}, 0x8005) sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) 07:30:35 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000000000000001000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:35 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, "00000000000000000000000000000000000000000000000000000000000500", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:35 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x105f0c00]}, 0x6) [ 1320.629132] ISOFS: Unable to identify CD-ROM format. 07:30:35 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32d060000000000]}, 0x10) 07:30:35 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0xdd17, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000040)=0x101, 0x4) fgetxattr(r1, &(0x7f0000000080)=@random={'trusted.', '/proc/sys/net/ipv4/vs/conn_reuse_mode\x00'}, &(0x7f0000000480)=""/4096, 0x1000) 07:30:35 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="1941b722a7a6d34535fd5182f8076d368b2cb0c9625ca1f01e1308cdf807c3ad1119b66ba934fbaf617d53c629cd4a70462ec085165dc16b3e3792a7fc796eca0273b16b7081451731822a058184dc3f1262cb522db8c40ed534337e3746b6c91d5b0e7044e4af3596c29a5aab078c04463d4e5a6dd03fafa3232875ba90d49f90bdf430e98c0908a0e30d48efe0c58baade4b91d4124f25db0dff1e8e6c57aa14d93c91afa441cd8a9793e488383a97bbcb38e983843814200cca6c2cae99120fcba0ffb0016974457bc8d322cf92d5a653a33f77075e046c0aa5778e29789fff1d170eddc5002433b527ef2be8e85043015f89cdea881d9855b2047fdcef0e9d8c50e9fed623ecebd2e45ffd45425753b4bf8350b303ccec3701d86ff877d83b5570f1e9cf1f06bd6393070b6c09b09fc35b3b95eb3101d339be266ba2a3e8c05b5b0457aebc111fafea3e12b609732c0a64ad89bba1cd4bf36458cfa4f84f43f45a9f05ed89c01214bdd686683c2fd1187a29f3fa20b75cf2acf486154d967b6062d14ab847fb73e08e9984d058d1fddefeaf73c749b3eed06d9007180a0251cf2eddd2678d175828ba09c90884c4687cbb75e7f06f06ac2c8f5ebb502778444c24c80ca0e1415cf8a2cbe248d4fd712afb33bf4d44206089b2ce0fbf710b409fce14271f2085687e3b93ad84a2894a63d90bd63a7258918f0dbd225f58", 0x1ff, 0x1}], 0x2000000, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) [ 1320.719011] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1320.857598] ISOFS: Unable to identify CD-ROM format. 07:30:35 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x10d, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:35 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x5411, &(0x7f0000000240)="e854bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000080)={&(0x7f0000000480)={0x84, r1, 0x500, 0x70bd26, 0x25dfdbfb, {0x11}, [@IPVS_CMD_ATTR_SERVICE={0x70, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xffffffffffffff81}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@rand_addr}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1c}}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x26, 0x4}}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2a}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xff}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x5e}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x50}, 0x40000) 07:30:35 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000000050000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:35 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x215f0c0000000000]}, 0x6) 07:30:35 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:35 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8eb1092a]}, 0x10) 07:30:35 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x10000000, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:35 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0xdd17, &(0x7f0000000100)="f754bea0c4d7") r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='bcsh0\x00', 0x10) sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) 07:30:35 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000240)={'lo\x00', 0x200}) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0xdd17, &(0x7f0000000100)="f754bea0c4d7") r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x6, 0x400000) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x68, &(0x7f0000000040)=[@in={0x2, 0x4e23, @broadcast=0xffffffff}, @in6={0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x7418}, @in6={0xa, 0x4e23, 0x9, @mcast2={0xff, 0x2, [], 0x1}}, @in={0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}, @in={0x2, 0x4e21, @rand_addr=0x6c00}]}, &(0x7f0000000140)=0x10) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x5, &(0x7f0000000180)={r3, @in6={{0xa, 0x4e24, 0x5, @dev={0xfe, 0x80, [], 0xb}, 0x3}}}, 0x84) sendmsg$nl_generic(r1, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) [ 1320.967912] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:35 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x4000, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:35 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0xfffffffffffffffc, &(0x7f0000000200)="0458bea0cce0e4c54de26d03000000ddd22e8b08fb3e28230c4e8ad3e02b92c40f0a9a7ef57df9316787596e74dc2c280b89afdb158346644956df749f19341da8a58ff94b663c7e032f78445eae2fa95df1a6416a0ccc6b60afbf553f9891a58badd52b2d2985fcef11a15fe65a389ebe6f6302a2ad1e4f6d242c8d81b00ded0b3022d28110f066d9d148d854c6c25200000000") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) socketpair(0x13, 0x80b, 0xdf, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0xcdf4, 0xa4, 0x800, 0x3}]}) 07:30:35 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000f6ffffff0000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:35 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x1100000000000000]}, 0x6) 07:30:35 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, "000000000000000000000000000000000000000000000000000000000300", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:35 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}, 0x10) [ 1321.090332] ISOFS: Unable to identify CD-ROM format. [ 1321.180189] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:35 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0xdd17, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="ceff00002e00fd060000000000000000030000000c00000008000900000000008d583a00000000000300000093ce1dca685d6fb63fc532596b9384bc23011fb25786a8b00a356c0007e89b488f3414601b531be41a584bdb38038d4948cde8d1abbd22da808e899d028851e7a0b13e1d48a4b0a3dfc04f028c5a8173b69651d4e99fc7958ba4575469919f721c74d3eae6e9b977c8b3f6e38e7a41aac49304affd4a311ea5552bb71e6d3cd0c15583e9590f688df46c558de8bc91d700433a58bc0990ba8d26b44f00c750bcf726cf894f1ff046f424bc2aa338a39b44e1437968c1acf5fb8d13f7bf0d303740c7b184e8eb58380d3245899e59cd551e1304f31d08c9434baab3a63fd9b6cffeeac0347fbfa2534e7b27acab45c7c44bc5"], 0x1}, 0x1}, 0x0) 07:30:35 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x80002, 0x0) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000040)={@loopback, @remote}, &(0x7f0000000080)=0xc) 07:30:35 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a000000004c0000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:35 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x23, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:35 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:35 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x6, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:35 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8055]}, 0x10) 07:30:35 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x115f0c0000000000]}, 0x6) [ 1321.329268] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0xdd17, &(0x7f0000000100)="f754bea0c4d7") rt_sigprocmask(0x0, &(0x7f0000000000)={0x126}, &(0x7f0000000040), 0x8) sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) 07:30:36 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000020000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) [ 1321.406863] ISOFS: Unable to identify CD-ROM format. 07:30:36 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x8, 0xffffffffffffff7f, 0x3}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) accept4(r2, 0x0, &(0x7f0000000080), 0x800) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000000)={0xbd, @multicast2=0xe0000002, 0x4e24, 0x2, 'nq\x00', 0x20, 0x7, 0x30}, 0x2c) 07:30:36 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1400, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:36 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x700]}, 0x6) 07:30:36 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x330e3080]}, 0x10) 07:30:36 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x4aa, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) [ 1321.503339] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1321.569655] IPVS: set_ctl: invalid protocol: 189 224.0.0.2:20004 [ 1321.627415] IPVS: set_ctl: invalid protocol: 189 224.0.0.2:20004 [ 1321.636571] ISOFS: Unable to identify CD-ROM format. 07:30:36 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000000000000000600000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0xdd17, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="ceff00002e00fd060000000000000000030000000c00000008000900000000008d583a00000000000000000093ce1dca685d6fb63fc532596b9384bc23011fb25786a8b00a356c0007e89b488f3414601b531be41a584bdb38038d4948cde8d1abbd22da808e899d028851e7a0b13e1d48a4b0a3dfc04f028c5a8187bf9651d4e99fc7958ba4565469919f721c74d3eae6e9b977c8b3f6e38e7a41aac49304affd4a311ea5552fb71e6d3cd0c15583e9590f688df46c558de8bc91d700433a58bc0990ba8d26b44f00c750bcf726cf894f1ff046f424bc2aa338a39b44e1437968c1acf5fb8d13f7bf0d303740c7b184e8eb58380d3245899e59cd551e1304f31d08c9434baab3a63fd9b6cffeeac0347fbfa2534e7b27acab45c7c44bc5"], 0x1}, 0x1}, 0x0) 07:30:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, "00000000000000000000000000000000000000000000000000000000000300", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:36 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x79]}, 0x10) 07:30:36 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x105f0c0000000000]}, 0x6) 07:30:36 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") socketpair(0x11, 0x3, 0x7fff, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$BLKSECTGET(r1, 0x1267, &(0x7f00000002c0)) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000140)={'filter\x00', 0x0, 0x3, 0xba, [], 0x1, &(0x7f0000000000)=[{}], &(0x7f0000000040)=""/186}, &(0x7f00000001c0)=0x78) sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x400000, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000240)={0x400, 0x0, 0x52d9}) 07:30:36 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x4800000000000000, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:36 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1300, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) [ 1321.743290] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:36 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a000000006c0000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) set_mempolicy(0x6ba34cdde91df35f, &(0x7f0000000040)=0x3d1, 0x6602cb6) ioctl$sock_bt(0xffffffffffffffff, 0xdd17, &(0x7f0000001840)="5c2f93b8482e73643933726b704f1c86c63636762e3a13f3e104c1fbaaadfc5d831536cb1f6284f657e7581adebd55ab2e65a8219dde637ff53dea6faa1ccf541dcd76ec710c30085198cc7f9be80cbb165e875bd081abef411faa56fc74de4cf22095711d3cac10de77466890c3ce8fdb514ddc8360163aae6d5935f61a5a13b5f768851e7585c8800eba5d14ec80a954b38a14d4ab") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000, 0x0, 0x81ffffc}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000140)=ANY=[]}, 0x1}, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)=0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x400000, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000180)={0x7ff, {0x2, 0x4e24, @rand_addr=0x9}, {0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x80, 0x80000000, 0x5, 0x20, 0x800, &(0x7f0000000140)='syzkaller1\x00', 0x8, 0x7ff, 0x6}) sendmsg$nl_generic(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000340)={0x14cc, 0x2d, 0x810, 0x70bd27, 0x25dfdbfb, {0x15}, [@generic="6b6987eb9fa9ddf29eb7210cfa61c6a5d06e493ebb1346b23d70e938f7f8e55ce313ad9e8d85ec103741352bdb89a84416996322c8", @generic="694591ca5c86f97f1a651d26c80b26ed312c38d3c676fd2dc0e14f9e1ff6a5d626d12dc3e13fa4f036446cdf7a02", @generic="c9ad460d00b2cea402344385a5f4483e6ceddbcdeac8d9494471bca4e3d6905f9c7c332764f5", @nested={0x208, 0x92, [@generic="b2c7ab2501fcb82e7bccfb24dd476e9d75b4cd04bda0c78c5958564aefd482f864d5ba6ab09b6b8b95798315f776f72368733fc2acca6e8332b77c4aca19509bae1f2d3961cfac7bc8c7b456cfc66442b8a7cf7dc7ad15c7001b7f2d5995a06549d6b23760cd6754b98fca2508d4052182a258f78fb53a22f882438d1e2b4ab073c6a8463b1eec963c2654ee70d53bb0e36ee0e339a386b72060cf267e4eae7a3b09b3a7e2015f092dbf9ecc1dc5f1fee5370f5b12901ab2aadd97ef107c59409cab618787010bed3bd88bc352c82bbfa8", @generic="e14d32fc24008c323fd786bdf99b13dbaabaa303eb7134a5abcbc1feb11c9d356b26f7e3c439afe6763c3dcecd12e588d929a6eee2758729b4def631ea2bad9784ef324f255c04aa7b5f5e36ef4984388d78ec3b90b3dbf8bbab851abe08b9dfd998b7477c86d4ecbe916bd9d8345f2ec376a5e1dbd0e53ab765e2366a2521d7781a63371069694d20be5aff5889fc5ecf673ba373e1f93b7191ce4f530318455333", @generic="95", @generic="e578a90de6059757d006dfbd83e092de90ce02575a0fe7a4ec6db06165438c3ddb95e6036df82e2cd329326c72ff9567", @typed={0xc, 0x5a, @u64=0x80}, @generic="a09747b139f7a54895b9fb0ade1fe56d19aac54315529f784874fb49c0111b8c5262416fd21e0c5b42c25d1a612e01103577fd731ad93154b6c56f0752ba7ecc82ba5b33321ed1f666e8b93cb23afc8df4"]}, @typed={0x8, 0x3e, @fd=r0}, @nested={0x200, 0x16, [@generic="784b26b2f1895f1104934bb97b131de084cf1fc8d488954ef4084c2b9b7d7c8ed7dc23501fe5f6602b07676c31bc6fc05126fadaf9473795fe154a22d33148df040c8e46958f5bd0b3268dbafe97f495fcc92be80ff38932240d6dc8e0bebe605984aa7ea72808e01d4da8b262c55338973acdabab2f2c7c22859470b75067357815bc1352a21d4e8ed3ebbfdb419a294deba0592b088a0e2f2ae2dfac0915638af2577fb0", @generic="558b482f4c81d43179e8d6b3e445bb52e68eb354c9b2d95178f467b84937faa37ffc6f8b06c826f37fdc82c1110c949c38b4b817795d7c4899cf21d48b610637f18d28954a76e6ddfb69e57765137d4fe55d147c3632e55b2350cc997d1855c6dad7c45167aafa17a5057d658a774659ac186ef6731e160951b975cb949687476b923eb752936140c786c2998c5cb4c37311904196d7ab5135", @generic="b8f07922c1abadcf1206806e3b09b709a6f3c54a19375e1b32ead28449d7c2e694950e483adeec476198053be62e71690f1301e1157c7b6b2907a72f087d7585118e6596a1435c0c8b1a88789fe163dcd1ada176d88a31bb2717e50e0a472711eaf957de11476f351276ea16f910238864287071805b23a000526191b55a7bb444b24812adf675584037633ab7bc81a593df1efe11772a9b5e2ffb92657e72e9e6d6650c47b7935ad92358a57a10ab", @typed={0x8, 0x5, @str='^$\x00'}, @typed={0x4, 0x30}]}, @typed={0x8, 0xc, @pid=r1}, @typed={0x1004, 0x40, @binary="8df8485d087ee4d2e6500513ee4d99eb84b132372d6f7bd53f97b0506746b739b623705a7d8d3c46d58c9b4431c624cd05abf8ba61bba8930604cadd65f1da2f50ca5754689f976f2ae40250870988c5dd26dd170a7e904e06732de87de8ad2898c7f85503576ecd482463abec66303ed3f98d842d27f86c2d7d549c66452f521bade1d836303705742c7beb7f1050f4d1d7439ba38fcbb06c098dbe280d8666538af8cc830627e3702f6b9841662ca9a86ddb5073cfd447b02eacd2fc3706ddf859487e06d79df171e495372a963f64ee86e397d28f5ca8783c6ac5d1c170f01ab6e774fc4406273d9619f17053d28c999dfd7a3c240effdee0a86dc2b83fcee62d48e3f5a9d8e81588defd21f908c9e6d591187edc0a46d81e42933b83970fd162ad9b1ca5d48f528f7c0e65e37cea1f1147c027160a549c9c667208822dcfc81c51fe38c74520da5fb1e24c5b64f845591c10c933342df7714f958e3f5b1b261eee63d9a30bed03c9e73e79be7e84d4eafdd0a5b3105f466be50f59bc7836be4235963c37ceec3178978cfb82771925a0f6b89a1dc4cc13bc6659d8c772e8fa0dbd710c0d9edeb24d1e093a94368d0d839376410817b54907d0aff44ef14632210cbcb350a181e827073703b85e1dc3076490a617c296484ff6dca65fa9b64e057ff4bb5af38418e9bcc5e971c1c352ac6b42efb189b97050431066c89409efd454b9fbe1b7ee1dddf220975e176fc97993c655de8fae4d22d095917cd22b218b50a2c360f1ac5a12a6d3b7aaca1c7d5d883ebdfd2718c2b54b7b1740a3c86fa4e5b385effa477e0def93ac0f426797cf8f39c5144731c623c99471b8c5f2f08eb7258fae061a7efc843de2282ae0cd58551cd355794b84b4194e8531f734a745447a5ee2f9e5ebe2af16d57e897de2b7fc9752e4cad4f0fc56fc7dd5b1c8e47cf55f58328cefb0160dee63608c4f0ed724c7f09d5ba452df369bf1e7bdcf5505d996ceb0d560d9adb3bd15248cc540bfa639e4abbccfff3dc36d7c320a7acba4df9ac0dd1d37c2c43a76edf6547a8e92a02383860a608ea5a8e5d36fd8154e4b79ef481694f9e8dbe8847692713c77cb24c889cf29681dcaafef579e3c10c812f8999ef2d00093e259fa2cd1e0c1b10423223220096ae9c5d77895289be4d265d18583c42564aedca6bccee9cc3c656c1f21d794eed828267ab14cecde2994e0b384e29efc5db9a420eb8d7981acc882a6360199f5df38c08fbfc07a38fc427bf472c1a7e4cbda01c27f32021b1646ee056b91683795825254b898034d529933b5355e9805a534a2dfa258e2cef722018dbe938d5f846000ab9b2dbe7cb26dfd3bfe6bfc8a5f6e391eaf5a706c92b953d67e49de0f1bcbbfbc0c798e5a4b087656e270b297ee4896cabff0f44c2f1bc15d79b784a930f4291e123d5fdf4e884b04ad302165bcaeacafe27a0afde598e1c1baf75fccde01b98adcd368d9a45d8487d7182b51128f2402b2a7b6bcff172ca29eb06189184f8abf005ad5882fc631f8de7c26a42153a68bc1ea56ebed913ea7c0360c7e95b4f1ec0d8463f3bc10b9261a038e830cb51a471210635ba8a227a60962724d4a808939b2675fa5a23818256a96f34650f1df94476a8b96b559cbb9b270e8bfa681267cd9bfd6ca8abb2ba18b5b8cb0b5a271e500c8db6ae522286d7b49a6c9cbc8fe36505b1ed4bf85d9261c6d99a7dd81e53d8ec4589e490bc3190e53e4480f138888a4e051a513d7fece346143c4fafe7bd5928a030b3d02050da8c73b8788eb9e934894a1bd31ac1020b6ac44735a4601178173c9afee26ac13f54a8cc6b79ce548a1ca37d952eb71778f6acdc0a68bb477a000602e1a6303be6b83d5fa505053927ee5b13187a4f6c7627bcd994bdd8a00adf7ae5016c167557b65878632c7fb8c5e30c26c39390a2df0d7cb0667709d76639ff69f6a873582b0ea2df7a0d664099eb04c7324ba9bc045fc3272e02dd9836583482157a75b3a578a9f5e3015c957296f056f691b2a503c77954c6d8328e24bc38c1330f7da4d791f4964d8dc1c2331eca604ffc5d6ad4f194603836fe9e9c4cadccb9c412b0f28b56279e09e11a5fe08fc54e0c40035dbb638b02210d607bba6fc68eb02dd6a609d98d8464d52346e95d856a571b83a6b40cce0bb2bca41eb2a6298df3239cfb3430bc8d45af29d453fef7c1deb61aa7ff1d4ec35f1bb94a31136c992a6c1f0c16e7ae88b6548c0f12e5bab3790b9e62e1d1bc343e71a12827332e14c4802707ee725fe8d75fb9d3e0dd6fdd862c615869dca4335df76de06692da8051bfac52550a3aa0721fb7949cc799bfdee0f0d9adc3b3f87c5d817b0556c4c8a515d3a71a7854bc26beddadd3b0b77e8889f39b67d2fc1b1d6a08a42805bf301a8c2eb8748f62a015f6f3567aeb64924ea1ef55108a2551af2232f3394484ea7276cdf0fc16690840ca99b51246f7f03b56796a61cfcb26bbf32580f899eb2aeab7eb2a5c375df31498cb0c79170872417a468c5ec4d4d7bb73253fc4900bd78cede3383120a97a9b9621b9c0aff211eb959553c4debe949b99880629dde3987e00570fe6339e3ffbd795f75f5b64aa09174f652043275e7073bdb4bf43a99ae3c9e62ad6aa4a4afe17a62a72431638d5c69b91cc25b80458f8c7c1007bcc4238476bb5f136482e01a2818a93d42809377928a30f2104935bb999b7aa9fa93fe01ac7a906fd78c90da5857fc6186f3f18018c0b63f40d1284d6b9bd18c8b21384fde1b9f3e046289ad62ffbb04ec952c0cd5b2c2524e5d9b9ed5d2d55e4e20d1596ccfdf7eff432c7ffbc2df80076d0942e8b2db423446be5d900f1e9945c6265eefbe20467a2cc735175cc815f908cdd8fcba2a3a10e362592cd87354a4a07efe651e880e51252998db6440a24dff824e7b2d4cc9168d0692a326e679d59c634ac8810b9ec6cb885a5e96895ef1bffd8816e02636135cf4d5c53505715da24d7efbd493eadd78c2393ba970234be00a66760aa3794b60cf7923668d09bd1096c62b1cfc288b2fda382dd2bc0084d9b0852ff5ad34ff99749cafcb29df07d526556754f8aadb9bae7e7c8ac9d6553124b8e8db98ac331a73aaeddbcb2f43d23cf3f097a8db3ece4624eaaaa8a8896384ff6564b86a813941008c6968e8adf1b027d1fb0265fc567f96181e9e4ef94c0fe06606ab1bbe86080496ac174ccd92be667c5a59618df6b2ac386d4a2a102d4fc598a63c50082c0367c059dc2309fbb090c4830320651242d18f9487299ec88a9df4b6262b646b184dc70ff989f1f427ee2d8befb25a9a99b02ef44a56f8d851cbe06f9e0850328bbab36e2027119f6b7c3abba49c1545a681868cc676f882b9f2e6c0c0e1375930f58c37f371e0c3afe899f91cad11f51a3294bf708c2bdcc9ef1c686ae812d5e873b88f6f9a390cbab5f62e58e717ff56edfb24c0e02aa8679a4cba592b1fc2a2ea5ac87f036f036ec21a95463c50e2fbee0d94fffc92d02fa5ac0d59035c835ed3a1fbb2646dade8fabac4781cec62546a1835a6ab69406843b201ed12af3211183193c899e1f84ebb5bf77682a74e61615c930e9d3fbe12d727329a9a33b6441d470af9d54b497d2ee038e440b291da66667b5ec9b93607864387d6517e00b117a464f2d64a6f22f66cd334256e90eb140fa79001f6fa370fa009cd23f918f82abf4c8d901d1e37418901b518341867a3177b831930df78673664f6b47f779fd259f9e16b1777811e106fcf110761f10c59cdda417063122b16e6c3323a1887bd587a3845298f269271280631b49a2f470941ee615a3794d0961c656c440cd51b2301961e837726626ee0a436a4e2fbde93caebcae47969e4ccbd0f929d205c1e549b9ebd0d29975bc2a935e53237bb8ba55dfc363e1d3218ef68f877b660fe03354215ae818f96d097abacc8ae5db18ea2fb691dcb05b03697f3a3aa9c1bf94f3c27c351707bb2036ecf0ed86879db2ec7efb28339d048e29399a2667af49167cfcf640bbb6a5dd88146edd3a8fd97c93642b2ec22595088fd18eef3ac779582c126f35d93b561b369fa6b5b1aabc5309709769ebd6ce3cfe7c652bd45377f27fdf49f8c15e06f3deb39855cc7c1492e66e1237f33a11575d5379a347d20aeb91b5256cb35985240b605991dcdd4c8b6b1a3d0311e7b5a07020f3057633f55e3b52a69ff01c5b3cf8c3ab87bb1ea8d5ba8e9778fa03d6a0c232fc1dc90d5d78816873ccc8e936203dee96b2087b752f1dec528c999d719b3c32c9147ba1baa741a15f83542f8d22846484f10760c4efa28f5223f56e82ae28af0d6cc8b51470b5621ffd92039c8cbccdd30f48d980906e33c245521a0215e10c8d26a5cc64d7c2a79541f3022ca03a60bb58fc8ce5eaa9c757acd4c24ad10da6f599c05b916c95dfedc94e47115ab80749b96410ed8f215cfc4331ca68d88e603949e125ec90c3a91dfc2e73b9bc408cc07044f1f9de6a35cbd58c31c67b2c4c18b035d78d8ed9359b76def559882480a5d09c56834bd60ab534cc66ca7f34984299336c5fe87023f33ee4f55bce309b728646fcbe36c5e39439ade7a2cea3483ef37f350bde75489548e07215b7b7cf240c83d82e13056f0c8ac30a0be78eaa11ca6380f74ab6c170b5158bf698adcca5d45e2ea63b4b60976526dd6c96845acb4931c4b2871fbbe13a6b77c4a98c22f277bae8730dbd642ece3538a1e9489db6fcd15e9b75da182f9317fb9fbe30846ae05a11752f3da26b0923c633aba6b9f826befc7d294ecb223fb5de3f545bc863807fab748b8c5c71ca79a95a8ad9f231e37b13a5d151ad82035aecea9fb58f4dcfd18ed8d91fbed151893301d2e5daa3381f9e0866cb5076779c321f5e9f8b1943301f4420f304645d9c740de969a37fd09815beaf5e45409e602272011edb5e0433ffbf6969179ddf15a3325a4aa5b756d9ceff2e160fec6587a4eb71824b9dfb6f93c7f23c8770988301c9631b21726bde8ec3bfc83acbcfd4482e0757e83bfe97a01c5264e3d4829ccb2c76c9a0c21c18537cd18de2008771720a555a3fd27667eaaa7d05b734eb4e322896dc8840bb85086104663120e7a76b68efc7df4fcf78468db9523c94c9308986cbf0f998e68204c8c6d08d25cf28a0f8c8102bbaff9783ec1fa890ff27ae387c580369352c35942c29edac4a03de16260748bcf18acd0bb4141513e2e42d5d02cbac42b5f38c46569b70b500c453a5d33c4391339fc50578a23e22fd5b49e7031cf58514e9aed17be9f0e0dda2a4bddec5e0a35ce3e185a4d00c5a887258d8fb006158253f2a208083128703cc52cf5f72d71b15fc48d3ad5953d1e578975e2007cd9b0bd3d2fd12a127d7fe5f9dec99fdf3b0f20eb261daa9ca8d6f9836aec762af9a716f6af7988c765822b987f8896d023c371918c69a42c5222bae7f1440bdad992351ab73b91fb5ab00255d53e9d0560084d493a31b666372bbf3f1a352e789e9a9a3506f81347ad2e1ba553722348896ddf7053840042767e25c9c95478d12db74fcc45a0b0bdb99db5aaf62d2088af5e0e014a891e98e0c7a8f4c8fff6ea50fb9c2d968719e3c34b6faefbd1b3350172300150165843debbe249a975179f63bc7e29c323eb76d5062b329793b5ed569059485136d083662ab474bff38a8b82296d8079766f67d9e5dd36f3378b09fbf1806be02f9a041e3e88cff5492355d8a43359a513a78b9da5981aaa6acbf92d6ee3be3171e15a58c359ac39bc60"}, @typed={0x8, 0x6, @u32=0x2}, @typed={0x8, 0x2a, @ipv4=@multicast2=0xe0000002}]}, 0x14cc}, 0x1, 0x0, 0x0, 0x4000}, 0x2000c010) 07:30:36 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000, 0x0, 0x32f6037f8e15a232}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 07:30:36 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x7000000]}, 0x6) 07:30:36 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, 0x10) 07:30:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) [ 1321.883110] ISOFS: Unable to identify CD-ROM format. [ 1321.977917] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0xdd17, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) 07:30:36 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="ceff00002e00fd060000000000000000030000000c00000008000900000000008d583a00000000000000000093ce1dca685d6fb63fc532596b9384bc23011fb25786a8b00a356c0007e89b488f3414601b531be41a584bdb38038d4948cde8d1abbd22da808e899d028851e7a0b13e1d48a4b0a3dfc04f028c5a8173b69651d4e99fc7958ba4575469919f721c74d3eae6e9b977c8b3f6e38e7a41aac49304affd4a311ea5552bb71e6d3cd0c15583e9590f688df46c558de8bc91d700433a58bc0990ba8d26b44f00c750bcf726cf894f1ff046f424bc2aa338a39b44e1437968c1acf5fb8d13f7bf0d303740c7b184e8eb58380d3245899e59cd551e1304f31d08c9434baab3a63fd9b6cffeeac0347fbfa2534e7b27acab45c7c44bc5"], 0x1}, 0x1}, 0x0) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000040)='./file0\x00', 0x3, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="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", 0xfc, 0x1}, {&(0x7f0000000080)="bc7a1870541e8d7c413c80a193c85e6edb6006d65f176e2f563ba04e2fc2126a6105c0e1d7429dc354", 0x29, 0x7f}], 0x2308000, &(0x7f0000000240)={[{@creator={'creator', 0x3d, "3156a709"}, 0x2c}, {@part={'part', 0x3d, [0x30, 0x31, 0x37, 0x78, 0x3f]}, 0x2c}, {@force='force', 0x2c}]}) 07:30:36 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x9300000000000000, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:36 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000000000000096e00000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, "0000000000000000000000000000000000000000000000000000000000000600", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:36 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0xffff88015296c1f8, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:36 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0xc5f16]}, 0x6) 07:30:36 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000000000000]}, 0x10) 07:30:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0xdd17, &(0x7f0000000100)="ce175f771bd7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) 07:30:36 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="ceff00002e00fd060000000000000000030000000c00000008000900000000008d583a00000000000000000093ce1dca685d6fb63fc532596b9384bc23011fb25786a8b00a356c0007e89b488f3414601b531be41a584bdb38038d4948cde8d1abbd22da808e899d028851e7a0b13e1d48a4b0a3dfc04f028c5a8173b69651d4e99fc7958ba4575469919f721c74d3eae6e9b977c8b3f6e38e7a41aac49304affd4a311ea5552bb71e6d3cd0c15583e9590f688df46c558de8bc91d700433a58bc0990ba8d26b44f00c750bcf726cf894f1ff046f424bc2aa338a39b44e1437968c1acf5fb8d13f7bf0d303740c7b184e8eb58380d3245899e59cd551e1304f31d08c9434baab3a63fd9b6cffeeac0347fbfa2534e7b27acab45c7c44bc5"], 0x1}, 0x1}, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xb, &(0x7f0000000080)={&(0x7f0000000140)={0x58, r1, 0x200, 0x70bd2c, 0x25dfdbfe, {0x5}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x401}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) [ 1322.130828] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:36 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000fffffdfc0000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) [ 1322.186682] ISOFS: Unable to identify CD-ROM format. 07:30:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getflags(r1, 0x1) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x95, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt(0xffffffffffffffff, 0xdd17, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="ceff00002e00fd060000000000000000030000000c00000008000900000000008d583a00000000000000000093ce1dca685d6fb63fc532596b9384bc23011fb25786a8b00a356c0007e89b488f3414601b531be41a584bdb38038d4948cde8d1abbd22da808e899d028851e7a0b13e1d48a4b0a3dfc04f028c5a8173b69651d4e99fc7958ba4575469919f721c74d3eae6e9b977c8b3f6e38e7a41aac49304affd4a311ea5552bb71e6d3cd0c15583e9590f688df46c558de8bc91d700433a58bc0990ba8d26b44f00c750bcf726cf894f1ff046f424bc2aa338a39b44e1437968c1acf5fb8d13f7bf0d303740c7b184e8eb58380d3245899e59cd551e1304f31d08c9434baab3a63fd9b6cffeeac0347fbfa2534e7b27acab45c7c44bc5"], 0x1}, 0x1}, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x420001, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffffd, 0x1, 0x1, r2}) 07:30:36 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0xe]}, 0x6) 07:30:36 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0xffffff7f00000000, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:36 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x400, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f0000000100)={{0xff, 0xa8, 0xec4a, 0x8001, 0x5, 0x20}, 0x20, 0x2a2b, 0x0, 0x1, 0x7, "85a4cf2e30c08c9d8b1de11ef45b08007211a8d8b991f4ea563fe4659990b206dd85beca32f9568a22e18cd66bf296a69d98e26cd84c6e6786d6089c306a5338b44e2ed2838e3fd2d4af2235821cd7224544973d28cd9bc0e5d92a89f3a5f1fbb93deab14664ef5dd2330318d8a216b8cd585c14c99131da6189156b397ec6f0"}) ioctl$sock_bt(r1, 0x8907, &(0x7f0000000040)="f754bea0c4d76c27eb49ba2fafdc909b894214b254eefccaa533fdbc0575c81caf93b7fce33a9eb485d9cb3a48dbb1e8774721d80b8c360c238ba411d82ab39835eb97dfa27e") setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000000)=0x22561, 0x4) sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) [ 1322.302268] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:36 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1802000000000000]}, 0x10) 07:30:36 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000000090000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getflags(r1, 0x1) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x95, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt(0xffffffffffffffff, 0xdd17, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x420001, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffffd, 0x1, 0x1, r2}) 07:30:36 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x5, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) [ 1322.454299] ISOFS: Unable to identify CD-ROM format. 07:30:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:37 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000040)="f701002585e477c7c2abc74a5996b60e2ae8677909000000000000000000000000000000") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_score\x00') openat$cgroup_ro(r1, &(0x7f0000000200)='cpuset.effective_mems\x00', 0x0, 0x0) 07:30:37 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0xc5f21]}, 0x6) 07:30:37 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000007a00000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:37 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0xaa04000000000000, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:37 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40020000]}, 0x10) 07:30:37 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getflags(r1, 0x1) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x95, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt(0xffffffffffffffff, 0xdd17, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x420001, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffffd, 0x1, 0x1, r2}) 07:30:37 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1ec, &(0x7f0000002a80)=[{&(0x7f0000001a80)="19414e544653202020205182f8076d368b2cb0c9625ca1f01e1308cdf807c3ad1119b66ba934fbaf617d53c629cd4a70462ec085165dc16b3e3792a7fc796eca0273b16b7081451731822a058184dc3f1262cb522db8c40ed534337e3746b6c91d5b0e7044e4af3596c29a5aab078c04463d4e5a6dd03fafa3232875ba90d49f90bdf430e98c0908a0e30d48efe0c58baade4b91d4124f25db0dff1e8e6c57aa14d93c91afa441cd8a9793e488383a97bbcb38e983843814200cca6c2cae99120fcba0ffb0016974457bc8d322cf92d5a653a33f77075e046c0aa5778e29789fff1d170eddc5002433b527ef2be8e85043015f89cdea881d9855b2047fdcef0e9d8c50e9fed623ecebd2e45ffd45425753b4bf8350b303ccec3701d86ff877d83b5570f1e9cf1f06bd6393070b6c09b09fc35b3b95eb3101d339be266ba2a3e8c05b5b0457aebc111fafea3e12b609732c0a64ad89bba1cd4bf36458cfa4f84f43f45a9f05ed89c01214bdd686683c2fd1187a29f3fa20b75cf2acf486154d967b6062d14ab847fb73e08e9984d058d1fddefeaf73c749b3eed06d9007180a0251cf2eddd2678d175828ba09c90884c4687cbb75e7f06f06ac2c8f5ebb502778444c24c80ca0e1415cf8a2cbe248d4fd712afb33bf4d44206089b2ce0fbf710b409fce14271f2085687e3b93ad84a2894a63d90bd63a7258918f0dbd225f58", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) [ 1322.634301] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:37 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0xfffffffffffffffc, &(0x7f0000000000)='\x00\x00\x00\x00\x00\x00') sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x80000) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f0000000080)=0x9) 07:30:37 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x2d5f0c00]}, 0x6) [ 1322.757140] ISOFS: Unable to identify CD-ROM format. 07:30:37 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000740000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) [ 1322.786373] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:37 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0xffffffffffffffff, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:37 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getflags(r1, 0x1) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x95, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt(0xffffffffffffffff, 0xdd17, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="ceff00002e00fd060000000000000000030000000c00000008000900000000008d583a00000000000000000093ce1dca685d6fb63fc532596b9384bc23011fb25786a8b00a356c0007e89b488f3414601b531be41a584bdb38038d4948cde8d1abbd22da808e899d028851e7a0b13e1d48a4b0a3dfc04f028c5a8173b69651d4e99fc7958ba4575469919f721c74d3eae6e9b977c8b3f6e38e7a41aac49304affd4a311ea5552bb71e6d3cd0c15583e9590f688df46c558de8bc91d700433a58bc0990ba8d26b44f00c750bcf726cf894f1ff046f424bc2aa338a39b44e1437968c1acf5fb8d13f7bf0d303740c7b184e8eb58380d3245899e59cd551e1304f31d08c9434baab3a63fd9b6cffeeac0347fbfa2534e7b27acab45c7c44bc5"], 0x1}, 0x1}, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x420001, 0x0) 07:30:37 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="ceff00002e00fd060000000000000000030000000c00000008000900000000008d583a00000000000000000093ce1dca685d6fb63fc532596b9384bc23011fb25786a8b00a356c0007e89b488f3414601b531be41a584bdb38038d4948cde8d1abbd22da808e899d028851e7a0b13e1d48a4b0a3dfc04f028c5a8173b69651d4e99fc7958ba4575469919f721c74d3eae6e9b977c8b3f6e38e7a41aac49304affd4a311ea5552bb71e6d3cd0c15583e9590f688df46c558de8bc91d700433a58bc0990ba8d26b44f00c750bcf726cf894f1ff046f424bc2aa338a39b44e1437968c1acf5fb8d13f7bf0d303740c7b184e8eb58380d3245899e59cd551e1304f31d08c9434baab3a63fd9b6cffeeac0347fbfa2534e7b27acab45c7c44bc5"], 0x1}, 0x1}, 0x0) timerfd_create(0x3, 0x80800) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x400000, 0x0) bind$bt_l2cap(r1, &(0x7f0000000040)={0x1f, 0x1, {0x8, 0x5, 0x8, 0x3, 0x0, 0x81}, 0x6}, 0xe) 07:30:37 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x2000000000000, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, "00000000000000000000000000000000000000000000000000000000000600", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:37 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x6) 07:30:37 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ad0500]}, 0x10) 07:30:37 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a0000000000000000fffffdfd00000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) [ 1322.974015] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:37 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2800]}, 0x10) 07:30:37 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000040)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="ceff00002e00fd060000000000000000030000000c00000008000900000000008d583a00000000000000000093ce1dca685d6fb63fc532596b9384bc23011fb25786a8b00a356c0007e89b488f3414601b531be41a584bdb38038d4948cde8d1abbd22da808e899d028851e7a0b13e1d48a4b0a3dfc04f028c5a8173b69651d4e99fc7958ba4575469919f721c74d3eae6e9b977c8b3f6e38e7a41aac49304affd4a311ea5552bb71e6d3cd0c15583e9590f688df46c558de8bc91d700433a58bc0990ba8d26b44f00c750bcf726cf894f1ff046f424bc2aa338a39b44e1437968c1acf5fb8d13f7bf0d303740c7b184e8eb58380d3245899e59cd551e1304f31d08c9434baab3a63fd9b6cffeeac0347fbfa2534e7b27acab45c7c44bc5"], 0x1}, 0x1}, 0x0) 07:30:37 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getflags(r1, 0x1) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x95, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt(0xffffffffffffffff, 0xdd17, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="ceff00002e00fd060000000000000000030000000c00000008000900000000008d583a00000000000000000093ce1dca685d6fb63fc532596b9384bc23011fb25786a8b00a356c0007e89b488f3414601b531be41a584bdb38038d4948cde8d1abbd22da808e899d028851e7a0b13e1d48a4b0a3dfc04f028c5a8173b69651d4e99fc7958ba4575469919f721c74d3eae6e9b977c8b3f6e38e7a41aac49304affd4a311ea5552bb71e6d3cd0c15583e9590f688df46c558de8bc91d700433a58bc0990ba8d26b44f00c750bcf726cf894f1ff046f424bc2aa338a39b44e1437968c1acf5fb8d13f7bf0d303740c7b184e8eb58380d3245899e59cd551e1304f31d08c9434baab3a63fd9b6cffeeac0347fbfa2534e7b27acab45c7c44bc5"], 0x1}, 0x1}, 0x0) [ 1323.081897] ISOFS: Unable to identify CD-ROM format. 07:30:37 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000000000000006800000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:37 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x5, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:37 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x11]}, 0x6) 07:30:37 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") modify_ldt$write2(0x11, &(0x7f00000001c0)={0xffff, 0xffffffff, 0x1000, 0x5, 0x0, 0x60f2, 0xcf18, 0xffff, 0xfffffffffffffff8, 0xfffffffffffffffc}, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x58, r1, 0x208, 0x70bd29, 0x25dfdbfc, {0x8}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffff}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sh\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xca}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000088}, 0x80) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x0, 0x0) ioctl$PPPIOCSMRU(r2, 0x40047452, &(0x7f0000000240)=0xffffffff) sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) [ 1323.234520] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:37 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x8800, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:37 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) r0 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x95, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt(0xffffffffffffffff, 0xdd17, &(0x7f0000000100)="f754bea0c4d7") 07:30:37 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}, 0x10) [ 1323.350056] ISOFS: Unable to identify CD-ROM format. [ 1323.388160] __ntfs_warning: 182 callbacks suppressed [ 1323.388170] ntfs: (device loop2): is_boot_sector_ntfs(): Invalid boot sector checksum. [ 1323.401451] ntfs: (device loop2): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 1323.409877] ntfs: (device loop2): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 1323.421961] ntfs: (device loop2): ntfs_fill_super(): Not an NTFS volume. [ 1323.473207] ntfs: (device loop7): is_boot_sector_ntfs(): Invalid boot sector checksum. [ 1323.481336] ntfs: (device loop7): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 1323.489781] ntfs: (device loop7): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 1323.501841] ntfs: (device loop7): ntfs_fill_super(): Not an NTFS volume. [ 1323.562904] ntfs: (device loop7): is_boot_sector_ntfs(): Invalid boot sector checksum. [ 1323.571057] ntfs: (device loop7): read_ntfs_boot_sector(): Primary boot sector is invalid. 07:30:38 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000000080000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:38 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:38 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x185f0c0000000000]}, 0x6) 07:30:38 executing program 6: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x103000, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000140)={0x0, 0x3f, "6db017881727c7ab577d5dfa065943eea83aaa73e9cffea4cf9b997baff46ae12e8df57b2ca4faf41a931b6a1595184a1d633ee2bed3a2014d6aff283c952b"}, &(0x7f00000000c0)=0x47) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000240)={r1, 0x200000000, 0xbd1e, 0x8, 0x9, 0x7, 0x1, 0x6, {r2, @in6={{0xa, 0x4e20, 0xca08, @remote={0xfe, 0x80, [], 0xbb}, 0x9c9}}, 0x3, 0x9, 0x100000000, 0xc6, 0x1}}, &(0x7f0000000480)=0xb0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r3, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) r4 = open(&(0x7f0000000000)='./file0\x00', 0x900, 0xa0) ioctl$KDGETKEYCODE(r4, 0x4b4c, &(0x7f0000000040)={0xe6, 0xe81}) 07:30:38 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) r0 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x95, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:38 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55a409e700000000]}, 0x10) 07:30:38 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:38 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x4c00, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) [ 1323.693836] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:38 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000004800000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:38 executing program 6: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x2000, 0x0) ioctl$void(r0, 0x5451) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r1, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101000, 0x0) setsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f0000000040)=0xa, 0x4) [ 1323.790202] ISOFS: Unable to identify CD-ROM format. 07:30:38 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:38 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:38 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x95, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:38 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x1f5f0c0000000000]}, 0x6) 07:30:38 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf401000000000000]}, 0x10) 07:30:38 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x9a000000, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) [ 1323.897633] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:38 executing program 6: socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x200800, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040)=0x11be, 0x4) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") [ 1324.042679] ISOFS: Unable to identify CD-ROM format. 07:30:38 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000ffff1f000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:38 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:38 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:38 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x95, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:38 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0xfdffffff]}, 0x6) 07:30:38 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f00000002c0)=0x75) r3 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x2, 0x600000) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f00000019c0)=@assoc_value={0x0}, &(0x7f0000001a00)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000001a40)={r4, 0x1f, 0x2, 0x9, 0x8, 0xffffffff}, &(0x7f0000001a80)=0x14) setsockopt$inet_udp_int(r3, 0x11, 0xb, &(0x7f0000001980), 0x4) sendmsg$nl_generic(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)={0x1538, 0x40, 0x2, 0x70bd27, 0x25dfdbfb, {0x9}, [@typed={0xc, 0x5e, @u64=0x44}, @generic="7e592a3953935cde812e6e8999dd446bbf6970bb851a24750cdb3e9f68e60123f6cfe1a6644c6d604ae37a6a5f86a9cdbdc58e82a8a1930922cd79794ea974760ffb5dc6f7f6d27ac24367e9ea698861fa41bcdd9185731e777a38e72465255bb4f36f9720fd4a0a8b44b90526d3f00277fe2738007c13148842a75b763d390228d26a2ca95ec07b18183676f7cbfdbadf2bb15e64121df9efcd4363ebf341c2fb1949003de46f4c06be39a2b9c80ee667bc309ec2d13e78a126af8670b4f8ab46a4fe8e693818e72a41a57b7a5408effbe0d1e1056f986b978ac92a73fd8691f75dd1faf90a5fc9775ba8bed44cf2a32731", @nested={0x20, 0x7a, [@generic="fe88bbc606cdf508565aef30c84563750f8308210c4fa665f78d"]}, @nested={0x48, 0x92, [@typed={0x4, 0x53}, @typed={0x8, 0x7f, @fd=r0}, @generic="689e31beab5539749f15714a02c3e3d5811a543f35f7687f016a0d18e3ba045a8684c3c2520a89592678f6931482c280cb431877b37eae3f"]}, @generic="3653b14485c5f9e8b02c14ce44a69ec828f1eeb18fa44ef8cb1c2b0e5efa1c5aa4f7bb79c7031eaa", @nested={0x48, 0x47, [@typed={0x8, 0x6d, @fd=r0}, @generic="b2a6fe659f97c97681bb105ff310849edc980a", @typed={0x8, 0x42, @pid=r1}, @typed={0x8, 0x30, @u32=0x6}, @generic="3ed897ecdd354384d4ea409679204f5302b0fcefb53d948d"]}, @nested={0x34c, 0x7d, [@typed={0x8, 0x44, @uid=r2}, @typed={0x8, 0x87, @str='\x00'}, @generic="e3537c9f8aa090cbd9bfaba3040f3fb8922ea73d556a6a792152ce73fff9afd2048b20504507a09aa14bfd37651be9d553da458e93c85346002fd997b1c0ff6f19f0f47e486d2efe6602b796fcfa84e6769b25bedb00eb0e8a4fed9395da5b12428a876b58cda7d766", @generic="779a62279ea0abbfc213fe89203e83448e6144dac244db88b38a1ad421e41a51dcdb51de1361b615727da29e9ef75f038c7288ccee80e3485f6f2398271f4065232e", @generic="c11bb7b3cc3337503428c8b0f7a47132ea0d8ab43e2a39b6e6823b82e01ef73e9e1dea7e7be86d55123b52b5b7c423fb491f22f232a29aa7f7c366cf778506ccc11b80e0af1270ed6f2e0c4f08e7d66c13fa81a14c93b8efd8d7a8ab43ee59604125779895005943346769775101e2dfc455a4005df00c727d496d8efe816a990b5816589b618fcb6a9061ad759ef1f6602aebf48a55a53f1579b236e0b68ff83c9846f8a22b54c1dddd1e72fb0ba4190810d131b342a439e9a9a2754a13c4b1744833c1924247edd8bf", @typed={0xc, 0x44, @u64=0x3}, @typed={0x8, 0x8a, @u32=0x64d}, @typed={0x4, 0x8b}, @typed={0xd8, 0x5b, @binary="f84dc5d7300f5c2eb4c936f0473154d5bd3bf7c38c38e3c22a2e54aad820832abfa790dd0c123169e7941b209ef868043e8c3ebbf09e43128e9b135478dbe97f2e46df0ca8133276d17e32b2a5b4c3761a74b857ca88f39ce72e623f275bb2075ba7329962258de113acf7c76fc485e087732d4b81bcf0b8e4545cf330561fb5e58fd163f4b5082263c12052dc0cfae9839e878a83d011e15f8f185b40443f93e6d11b96fb07e641e3a3b3be4dbf1bfe4999e375db23e7886e04146c80e22eb2b39ed2c146653b9b2d64f7085ca99b241d"}, @generic="c58e3a612ce492eb102434ef2fc3be878173a90a71922fcec50926ff02d4ba53034f9bc13b494304ae75295985d1b847eab56a7e2f475efe59c38e11e33ad74c4289dd04061b3e4e32beccb6fc5bdba2824f4be14b4a6dd7ee6781c70481eb6b66bf9c4c3d097836727ad3b9e351eef4d0631be5b12d927357054e714b1cc6c2540883550ff89d7317c9e25a1fe535d30e7d5427d437638b07d85357798e923f231663b71bc9937903f2a5a4d7c5124b360037d9263a679745e60ee4d9e1d8f185e6e7aabc0ab9e3b8ac8480f05060a20a63"]}, @generic="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"]}, 0x1538}, 0x1, 0x0, 0x0, 0x40010}, 0x20004004) 07:30:38 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0xfffffffb, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:38 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe803000000000000]}, 0x10) [ 1324.159543] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:38 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x95, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:38 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0xfffffffffffffffc, &(0x7f0000000100)="f754bea0c4d7") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200000, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000200)={@dev, 0x0}, &(0x7f0000000240)=0x14) fallocate(r0, 0x0, 0xd917, 0x1f) accept4$packet(r1, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000340)=0x14, 0x800) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000440)={{{@in=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000540)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000580)={{{@in=@rand_addr, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000000980)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000940)={&(0x7f00000006c0)=ANY=[@ANYBLOB="70020000", @ANYRES16=r2, @ANYBLOB="04042abd7000ffdbdf250100000008000100", @ANYRES32=r3, @ANYBLOB="8000020040000100240001006c625f74785f686173685f746f5f706f72745f6dacbcc1dc654d31eb00000000080003000300000008000400", @ANYRES32=r4, @ANYBLOB="08000700000000003c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000000c0004000000ff530100010008000100", @ANYRES32=r5, @ANYBLOB="cc01020040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r6, @ANYBLOB="08000700000000004c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000200000040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000100004006c6f616462616c616e63650040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040005000000080007000000000044000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b75700000000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b00000008000400000000000800070000000000"], 0x270}, 0x1, 0x0, 0x0, 0x20000090}, 0x40000) accept4$bt_l2cap(r1, &(0x7f0000000080), &(0x7f00000000c0)=0xe, 0x800) sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000000)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000540)=ANY=[]}, 0x1, 0x0, 0x0, 0x20000000000000}, 0x0) 07:30:38 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) [ 1324.233258] ISOFS: Unable to identify CD-ROM format. 07:30:38 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000000740000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:38 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x115f0c00]}, 0x6) 07:30:38 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:38 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x8100000000000000, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:38 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x95, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1324.366361] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1324.481589] ISOFS: Unable to identify CD-ROM format. 07:30:39 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3cb1092a]}, 0x10) 07:30:39 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, "0000000000000000000000000000000000000000000000000000000000000300", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:39 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) r1 = dup(r0) timer_create(0x3, &(0x7f00000002c0)={0x0, 0x4, 0x4, @thr={&(0x7f0000000040)="463ec9325ac17eef862baaba6d2a11e889eb790942e8fe5d590a3eaa7ef524b3e186c9c67ee0fa4748bbfb6e4952fcaf5a9be66a85aa79c64672bdb93bf4f6fbc18d208729f0d3ad3b47110f612e69b6468f505f829414c5a73a12e72385422717f24714e8c6eac22be32d924d3a5f82b79124666995cda6c6826516fb347acb2cd477d985485a67fbbcffd0294ce1", &(0x7f0000000280)="1b4a315c970408153b3869affc537c674494980d0391805b44d82d"}}, &(0x7f0000000340)=0x0) timer_gettime(r2, &(0x7f0000000380)) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000000)=@req3={0x1, 0x5, 0x1, 0x8a8, 0x3, 0x2, 0x6}, 0x1c) 07:30:39 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x95, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:39 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x9]}, 0x6) 07:30:39 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x650c030000000000, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:39 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000300000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:39 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) [ 1324.614054] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:39 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="19414e544653ea2020205182f8076d368b2cb0c9625ca1f01e1308cdf807c3ad1119b66ba934fbaf617d53c629cd4a70462ec085165dc16b3e3792a7fc796eca0273b16b7081451731822a058184dc3f1262cb522db8c40ed534337e3746b6c91d5b0e7044e4af3596c29a5aab078c04463d4e5a6dd03fafa3232875ba90d49f90bdf430e98c0908a0e30d48efe0c58baade4b91d4124f25db0dff1e8e6c57aa14d93c91afa441cd8a9793e488383a97bbcb38e983843814200cca6c2cae99120fcba0ffb0016974457bc8d322cf92d5a653a33f77075e046c0aa5778e29789fff1d170eddc5002433b527ef2be8e85043015f89cdea881d9855b2047fdcef0e9d8c50e9fed623ecebd2e45ffd45425753b4bf8350b303ccec3701d86ff877d83b5570f1e9cf1f06bd6393070b6c09b09fc35b3b95eb3101d339be266ba2a3e8c05b5b0457aebc111fafea3e12b609732c0a64ad89bba1cd4bf36458cfa4f84f43f45a9f05ed89c01214bdd686683c2fd1187a29f3fa20b75cf2acf486154d967b6062d14ab847fb73e08e9984d058d1fddefeaf73c749b3eed06d9007180a0251cf2eddd2678d175828ba09c90884c4687cbb75e7f06f06ac2c8f5ebb502778444c24c80ca0e1415cf8a2cbe248d4fd712afb33bf4d44206089b2ce0fbf710b409fce14271f2085687e3b93ad84a2894a63d90bd63a7258918f0dbd225f58", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:39 executing program 6: symlink(&(0x7f0000000080)='/\x00', &(0x7f0000000600)='./file0\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000840), 0x22, &(0x7f0000000580)=ANY=[@ANYBLOB='bsdgroups,sb=3']) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) 07:30:39 executing program 4: perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x3e3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x95, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1324.774939] ISOFS: Unable to identify CD-ROM format. 07:30:39 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a000000000000000000000fff00000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:39 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0xc5f18]}, 0x6) 07:30:39 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, "00000000000000000000000000000000000000000000000000000000000400", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:39 executing program 4: perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x3e3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x95, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:39 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:39 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x10) 07:30:39 executing program 6: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0xa0000, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000040)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) 07:30:39 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x300000000000000, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) [ 1324.910476] EXT4-fs (sda1): re-mounted. Opts: bsdgroups,sb=3 [ 1324.930333] EXT4-fs (sda1): re-mounted. Opts: bsdgroups,sb=3 07:30:39 executing program 4: perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x3e3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x95, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:39 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000002000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) [ 1325.005412] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:39 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) [ 1325.061753] ISOFS: Unable to identify CD-ROM format. 07:30:39 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0xc5f27]}, 0x6) 07:30:39 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:39 executing program 6: ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="ceff00002e00fd060000000000000000030000000c00000008000900000000008d583a00000000000000000093ce1dca685d6fb63fc532596b9384bc23011fb25786a8b00a356c0007e89b488f3414601b531be41a584bdb38038d4948cde8d1abbd22da808e899d028851e7a0b13e1d48a4b0a3dfc04f028c5a8173b69651d4e99fc7958ba4575469919f721c74d3eae6e9b977c8b3f6e38e7a41aac49304affd4a311ea5552bb71e6d3cd0c15583e9590f688df46c558de8bc91d700433a58bc0990ba8d26b44f00c750bcf726cf894f1ff046f424bc2aa338a39b44e1437968c1acf5fb8d13f7bf0d303740c7b184e8eb58380d3245899e59cd551e1304f31d08c9434baab3a63fd9b6cffeeac0347fbfa2534e7b27acab45c7c44bc5"], 0x1}, 0x1}, 0x0) 07:30:39 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x8000000, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:39 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x95, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:39 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9502]}, 0x10) 07:30:39 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000230000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:39 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:39 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='wchan\x00') ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r1, 0x80045300, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000240)=0x10001, 0x4) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0x4, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3, 0x11, r2, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000480)=ANY=[@ANYRES32=0x0, @ANYBLOB="1e00000051c488cd9c4bce6193d7dc050006913b0000000000000000000000000000dba19aec93d6ea1fb5787415747e2ff702329eba808be50cb79eea8863132f8259a8d7ccb48e937dc72e4ab272fda3f2aa5d9bfa5eadc8133780c51c4962a7b4165734bf00dec6d512d7ea848cdc82268dbe995947f5717b0c13349a01d887398bfe6ddc71b3c9bbfff9426df0ffdd42d286079288360f000000000000000000000000000000"], &(0x7f0000000080)=0x26) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000140)={r3, @in6={{0xa, 0x4e24, 0x7, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0x80}}, 0x6, 0x0, 0x9, 0x3, 0x88}, 0x98) [ 1325.220343] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:39 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0xf4010000]}, 0x6) [ 1325.331043] ISOFS: Unable to identify CD-ROM format. 07:30:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:40 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x95, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:40 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000000000000007a00000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:40 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:40 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x400000, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:40 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x20480]}, 0x6) 07:30:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00]}, 0x10) 07:30:40 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x6, 0xffff, 0x1ff, 0x4, 0x2}) sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x200400, 0x0) execveat(r1, &(0x7f0000000380)='./file0\x00', &(0x7f0000000a80)=[&(0x7f00000003c0)='irlan0\x00', &(0x7f0000000400)='veth0_to_bridge\x00', &(0x7f0000000440)='IPVS\x00', &(0x7f0000000840)='veth0_to_bridge\x00', &(0x7f0000000900)='veth0_to_bridge\x00', &(0x7f0000000940)='team\x00', &(0x7f0000000980)='teql0\x00', &(0x7f00000009c0)='\x00', &(0x7f0000000a00)='teql0\x00', &(0x7f0000000a40)='nodevem0ppp1vmnet1lo{!\x00'], &(0x7f0000000bc0)=[&(0x7f0000000b00)='veth0_to_bridge\x00', &(0x7f0000000b40)='teql0\x00', &(0x7f0000000b80)='posix_acl_access{(-\x00'], 0x1c00) r2 = syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f00000004c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x23, &(0x7f0000000680)={@dev, @rand_addr, 0x0}, &(0x7f00000006c0)=0xc) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000008c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8480000}, 0xc, &(0x7f0000000880)={&(0x7f0000000500)=ANY=[@ANYBLOB="4c018a39e6dece595184ee", @ANYRES16=r2, @ANYBLOB="000128bd7000fcdbdf250000000008000100", @ANYRES32=r3, @ANYBLOB="3001020038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400040000003c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000000c000400010002800100000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000101000008000600", @ANYRES32=r4, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040000010000080007000000000038000100240001006e6f746966795f70656572735f696e74657276616c000000000000000000000008000300030000000800040001010000"], 0x14c}, 0x1, 0x0, 0x0, 0x200008c0}, 0x41) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0xec, r5, 0x610, 0x70bd2c, 0x25dfdbff, {0x1}, [@IPVS_CMD_ATTR_DAEMON={0x68, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'teql0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_bridge\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local={0xac, 0x14, 0x14, 0xaa}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'irlan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xffff}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x100000001}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffffffffffffffff}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x4}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x440}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe0}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xec}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}]}]}, 0xec}, 0x1, 0x0, 0x0, 0x800}, 0x800) 07:30:40 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x95, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1325.489593] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:40 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000000000000004800000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:40 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) [ 1325.577208] ISOFS: Unable to identify CD-ROM format. 07:30:40 executing program 6: ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000040)="f754bea0c4d7") r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x204400, 0x0) fsync(r0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) 07:30:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:40 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0xc5f10]}, 0x6) 07:30:40 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x95, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:40 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a000000000007ffffffffffff00000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:40 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0xe, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:40 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000]}, 0x10) [ 1325.732716] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) [ 1325.799770] ISOFS: Unable to identify CD-ROM format. 07:30:40 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="ceff00002e00fd060000000000000000030000000c00000008000900000000008d583a00000000000000000093ce1dca685d6fb63fc532596b9384bc23011fb25786a8b00a356c0007e89b488f3414601b531be41a584bdb38038d4948cde8d1abbd22da808e899d028851e7a0b13e1d48a4b0a3dfc04f028c5a8173b69651d4e99fc7958ba4575469919f721c74d3eae6e9b977c8b3f6e38e7a41aac49304affd4a311ea5552bb71e6d3cd0c15583e9590f688df46c558de8bc91d700433a58bc0990ba8d26b44f00c75091a226cf894f1ff046f424bc2aa338a39b44e1437968c1acf5fb8d13f7bf0d303740c7b184e8eb58380d3245899e59b6cffeeac0347fbfa2534e7b27acab45c7c44fc500000000000000000000000000000000"], 0x1}, 0x1}, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') r2 = accept$packet(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000000c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000140)={{{@in=@multicast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@broadcast}}, &(0x7f0000000240)=0xe8) r5 = syz_open_dev$admmidi(&(0x7f0000000540)='/dev/admmidi#\x00', 0x3, 0x10bc00) setsockopt$inet6_MRT6_DEL_MFC(r5, 0x29, 0xcd, &(0x7f00000006c0)={{0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x8ed}, {0xa, 0x4e22, 0x3, @empty, 0x20}, 0x7, [0x2, 0x7, 0x3, 0x9, 0xffffffff, 0x3f, 0x7, 0x1]}, 0x5c) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000500)={'dummy0\x00', r3}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@loopback, @dev, 0x0}, &(0x7f0000000480)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000680)=0xe8) accept$packet(r2, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000780)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000880)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000073c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000007400)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000007440)={0x0, @empty, @broadcast}, &(0x7f0000007480)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000074c0)={'team0\x00', 0x0}) getpeername$packet(0xffffffffffffffff, &(0x7f00000076c0)={0x0, 0x0, 0x0}, &(0x7f0000007700)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000007740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000007780)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007880)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000007980)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x20, &(0x7f00000079c0)={@loopback, @broadcast, 0x0}, &(0x7f0000007a00)=0xc) r17 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0x4000, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r17, 0x8918, &(0x7f00000004c0)={@loopback={0x0, 0x1}, 0x47, r7}) accept4(r0, &(0x7f0000007a80)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000007b00)=0x80, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000007c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000007c80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000007ec0)={{{@in=@broadcast, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000009000)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000009040)={'vcan0\x00', 0x0}) socket$inet_icmp(0x2, 0x2, 0x1) accept4$packet(0xffffffffffffff9c, &(0x7f0000009140)={0x0, 0x0, 0x0}, &(0x7f0000009180)=0x14, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000d140)={{{@in=@rand_addr, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f000000d240)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f000000db00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f000000dac0)={&(0x7f00000008c0)=ANY=[@ANYBLOB='0\b\x00\x00', @ANYRES16=r1, @ANYBLOB="02002dbd43000000df8c00000008000100", @ANYRES32=r3, @ANYBLOB="b001020040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r4, @ANYBLOB="080007000000000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e00000008000400ffffffff08000600", @ANYRES32=r6, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000100000008000600", @ANYRES32=r7, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004000000000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b00000008000400940d000008000700000000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r8, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000080003000300000008000400f7ffffff08000100", @ANYRES32=r9, @ANYBLOB="7400020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000600000038000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000080003000300000008000400ff7f000008000100", @ANYRES32=r10, @ANYBLOB="b80002003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r11, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000500000040000100240001006d6f646500000000000000000000000000000000000000000000000000000000080003000500000010000400726f756e64726f62696e000008000100", @ANYRES32=r12, @ANYBLOB="2801020038000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000080003000300000008000400040000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r13, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400ff0f000040000100240001006d6f646500000000000000000000000000000000000000000000000000000000080003000500000010000400726f756e64726f62696e000038000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400ffffffff08000100", @ANYRES32=r14, @ANYBLOB="dc01020038000100240001006e6f746966795f70656572735f696e74657276616c000000000000000000000008000300030000000800040003000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000200000008000600", @ANYRES32=r15, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r16, @ANYBLOB="3c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c000400686173680000000038000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000080003000300000008000400090000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r18, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000600000008000600", @ANYRES32=r19, @ANYBLOB="38000100240001006c625f73746174735f725f62726573e85f696e74651c76616c0000000000e9b6080003000300b864091504000900009f18000800fcb5cb2eae4549e0c1dc2149fb1436b358d84f3b80fa239d5bdfc17080dc64c71f2e28b29b40ab34", @ANYRES32=r20, @ANYBLOB="0c02020038000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000080003000300000008000400f600000038000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400fdffffff3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r21, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000000280008000600", @ANYRES32=r22, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r23, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004000600000038000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400ff00000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004005400000038000100240001006e6f746966795f70656572735f636f756e74000000000000000000000000000008000300030000000800040001010000"], 0x830}, 0x1, 0x0, 0x0, 0x4}, 0x4000800) 07:30:40 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000fffffff50000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:40 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x95, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:40 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:40 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0xf401000000000000]}, 0x6) 07:30:40 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x60, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) [ 1325.897160] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:40 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x95, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:40 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000080000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9]}, 0x10) 07:30:40 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x95, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) [ 1326.121053] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1326.151829] ISOFS: Unable to identify CD-ROM format. 07:30:40 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:40 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a0000000000000000ffffffff00000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:40 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) 07:30:40 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000]}, 0x6) 07:30:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, "00000000000000000000000000000000000000000000000000000000000200", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc90b3080]}, 0x10) 07:30:40 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="1941b722a7a6d34535fd5182f8076d368b2cb0c9625ca1f01e1308cdf807c3ad1119b66ba934fbaf617d53c629cd4a70462ec085165dc16b3e3792a7fc796eca0273b16b7081451731822a058184dc3f1262cb522db8c40ed534337e3746b6c91d5b0e7044e4af3596c29a5aab078c04463d4e5a6dd03fafa3232875ba90d49f90bdf430e98c0908a0e30d48efe0c58baade4b91d4124f25db0dff1e8e6c57aa14d93c91afa441cd8a9793e488383a97bbcb38e983843814200cca6c2cae99120fcba0ffb0016974457bc8d322cf92d5a653a33f77075e046c0aa5778e29789fff1d170eddc5002433b527ef2be8e85043015f89cdea881d9855b2047fdcef0e9d8c50e9fed623ecebd2e45ffd45425753b4bf8350b303ccec3701d86ff877d83b5570f1e9cf1f06bd6393070b6c09b09fc35b3b95eb3101d339be266ba2a3e8c05b5b0457aebc111fafea3e12b609732c0a64ad89bba1cd4bf36458cfa4f84f43f45a9f05ed89c01214bdd686683c2fd1187a29f3fa20b75cf2acf486154d967b6062d14ab847fb73e08e9984d058d1fddefeaf73c749b3eed06d9007180a0251cf2eddd2678d175828ba09c90884c4687cbb75e7f06f06ac2c8f5ebb502778444c24c80ca0e1415cf8a2cbe248d4fd712afb33bf4d44206089b2ce0fbf710b409fce14271f2085687e3b93ad84a2894a63d90bd63a7258918f0dbd225f58", 0x1ff, 0x1}], 0x6c260000, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:40 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1326.264607] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:40 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$sock_bt(0xffffffffffffffff, 0x8907, &(0x7f0000000000)="f754bae96b5f") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) 07:30:40 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a000000000000003f0000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:40 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, "00000000000000000000000000000000000000000000000000000000000500", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:40 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1326.365097] ISOFS: Unable to identify CD-ROM format. 07:30:40 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x195f0c0000000000]}, 0x6) [ 1326.446935] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:41 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") r1 = socket$inet_icmp(0x2, 0x2, 0x1) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000480)={0xa0a, {{0x2, 0x4e22, @rand_addr=0x75b}}, 0x1, 0x5, [{{0x2, 0x4e20, @loopback=0x7f000001}}, {{0x2, 0x4e21, @multicast1=0xe0000001}}, {{0x2, 0x4e24, @multicast2=0xe0000002}}, {{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x12}}}, {{0x2, 0x4e23, @broadcast=0xffffffff}}]}, 0x310) sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) 07:30:41 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}, 0x10) 07:30:41 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="1941b722a7a6d34535fd5182f8076d368b2cb0c9625ca1f01e1308cdf807c3ad1119b66ba934fbaf617d53c629cd4a70462ec085165dc16b3e3792a7fc796eca0273b16b7081451731822a058184dc3f1262cb522db8c40ed534337e3746b6c91d5b0e7044e4af3596c29a5aab078c04463d4e5a6dd03fafa3232875ba90d49f90bdf430e98c0908a0e30d48efe0c58baade4b91d4124f25db0dff1e8e6c57aa14d93c91afa441cd8a9793e488383a97bbcb38e983843814200cca6c2cae99120fcba0ffb0016974457bc8d322cf92d5a653a33f77075e046c0aa5778e29789fff1d170eddc5002433b527ef2be8e85043015f89cdea881d9855b2047fdcef0e9d8c50e9fed623ecebd2e45ffd45425753b4bf8350b303ccec3701d86ff877d83b5570f1e9cf1f06bd6393070b6c09b09fc35b3b95eb3101d339be266ba2a3e8c05b5b0457aebc111fafea3e12b609732c0a64ad89bba1cd4bf36458cfa4f84f43f45a9f05ed89c01214bdd686683c2fd1187a29f3fa20b75cf2acf486154d967b6062d14ab847fb73e08e9984d058d1fddefeaf73c749b3eed06d9007180a0251cf2eddd2678d175828ba09c90884c4687cbb75e7f06f06ac2c8f5ebb502778444c24c80ca0e1415cf8a2cbe248d4fd712afb33bf4d44206089b2ce0fbf710b409fce14271f2085687e3b93ad84a2894a63d90bd63a7258918f0dbd225f58", 0x1ff, 0x1}], 0x20000, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:41 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xc5f1f]}, 0x6) 07:30:41 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:41 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:41 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000010000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:41 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1326.624498] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:41 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:41 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000080)="f754bea0c4d60a34b26cec6da530304004aefbbdd7") r1 = dup(r0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000000), 0x4) sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) [ 1326.692109] ISOFS: Unable to identify CD-ROM format. 07:30:41 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:41 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000004000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:41 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, "0000000000000000000000000000000000000000000000000000000000000500", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:41 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0xffffffffffff0700, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:41 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xc5f27]}, 0x6) 07:30:41 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000340)='/dev/urandom\x00', 0x80200, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000380)={0x0, 0x9}, &(0x7f00000003c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000400)={r2, 0xab}, 0x8) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40000, 0x100) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000040)={[0x7, 0x7, 0x1, 0x1, 0x9, 0xdae, 0x0, 0x7a2, 0x407, 0x5, 0x7fff, 0x2, 0x80000001, 0x1c00000000000, 0x400, 0x8], 0x6000, 0x400}) 07:30:41 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="19414e544653202020205182f8076d368b2cb0c9625ca1f01e1408cdf807c3ad1119b66ba934fbaf617d53c629cd4a70462ec085165dc16b3e3792a7fc796eca0273b16b7081451731822a058184dc3f1262cb522db8c40ed534337e3746b6c91d5b0e7044e4af3596c29a5aab078c04463d4e5a6dd03fafa3232875ba90d49f90bdf430e98c0908a0e30d48efe0c58baade4b91d4124f25db0dff1e8e6c57aa14d93c91afa441cd8a9793e488383a97bbcb38e983843814200cca6c2cae99120fcba0ffb0016974457bc8d322cf92d5a653a33f77075e046c0aa5778e29789fff1d170eddc5002433b527ef2be8e85043015f89cdea881d9855b2047fdcef0e9d8c50e9fed623ecebd2e45ffd45425753b4bf8350b303ccec3701d86ff877d83b5570f1e9cf1f06bd6393070b6c09b09fc35b3b95eb3101d339be266ba2a3e8c05b5b0457aebc111fafea3e12b609732c0a64ad89bba1cd4bf36458cfa4f84f43f45a9f05ed89c01214bdd686683c2fd1187a29f3fa20b75cf2acf486154d967b6062d14ab847fb73e08e9984d058d1fddefeaf73c749b3eed06d9007180a0251cf2eddd2678d175828ba09c90884c4687cbb75e7f06f06ac2c8f5ebb502778444c24c80ca0e1415cf8a2cbe248d4fd712afb33bf4d44206089b2ce0fbf710b409fce14271f2085687e3b93ad84a2894a63d90bd63a7258918f0dbd225f58", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) [ 1326.817094] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:41 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000]}, 0x10) [ 1326.944902] ISOFS: Unable to identify CD-ROM format. 07:30:41 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:41 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000000000000000400000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:41 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:41 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:41 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x115f0c00]}, 0x6) 07:30:41 executing program 6: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000005c0)={r0, 0x6, 0x1, 0xd51b, &(0x7f0000000580)=[0x0, 0x0], 0x2}, 0x20) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/snapshot\x00', 0x80000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r2, 0xc02c5341, &(0x7f0000000500)) r3 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x2, 0x4000) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r3, 0xc1105511, &(0x7f0000000140)={{0x5, 0x3, 0x5, 0x6, '\x00', 0xf8d}, 0x4, 0x10, 0x8, r4, 0x6, 0xfffffffffffffffd, 'syz1\x00', &(0x7f0000000080)=['\x00', '\x00', '\'}ppp0loselinux&loem0mime_type+trusted]\x00', '\x00', '+nodev:]bdev\x00', ',@vmnet1ppp1\x00'], 0x45, [], [0x6, 0xffc, 0x6, 0x4]}) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x400000, 0x0) r6 = syz_open_dev$binder(&(0x7f0000003980)='/dev/binder#\x00', 0x0, 0x0) r7 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r7, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r7, 0x40046207, 0x0) r8 = socket$inet6(0xa, 0x1, 0x0) ioctl$KDENABIO(r2, 0x4b36) ioctl(r8, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$BINDER_WRITE_READ(r6, 0xc0306201, &(0x7f00000003c0)={0x26, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="00634040000000000000000083de273f178a0000f982353b4e192d00a694324268be2be8caf1"], 0x0, 0x0, &(0x7f0000000340)}) ioctl$EVIOCGMTSLOTS(r5, 0x8040450a, &(0x7f0000000480)=""/114) sendmsg$nl_generic(r1, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) 07:30:41 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8030055500000000]}, 0x10) 07:30:41 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0xa00000000000000, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:41 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000000007a00000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:41 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x80040200]}, 0x6) [ 1327.092296] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1327.108760] binder_alloc: 7213: binder_alloc_buf size 61904 failed, no address space [ 1327.116809] binder_alloc: allocated: 0 (num: 0 largest: 0), free: 12288 (num: 1 largest: 12288) [ 1327.125916] binder: 7213:7215 transaction failed 29201/-28, size 61898-0 line 2967 07:30:41 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:41 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:41 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) [ 1327.214110] ISOFS: Unable to identify CD-ROM format. [ 1327.268699] binder_alloc: binder_alloc_mmap_handler: 7213 20001000-20004000 already mapped failed -16 [ 1327.311422] binder: BINDER_SET_CONTEXT_MGR already set [ 1327.332536] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1327.334935] binder: 7213:7215 ioctl 40046207 0 returned -16 07:30:41 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="19414e544653202020205182f8076d368b2cb0c9625ca1f01e130ecdf807c3ad1119b66ba934fbaf617d53c629cd4a70462ec085165dc16b3e3792a7fc796eca0273b16b7081451731822a058184dc3f1262cb522db8c40ed534337e3746b6c91d5b0e7044e4af3596c29a5aab078c04463d4e5a6dd03fafa3232875ba90d49f90bdf430e98c0908a0e30d48efe0c58baade4b91d4124f25db0dff1e8e6c57aa14d93c91afa441cd8a9793e488383a97bbcb38e983843814200cca6c2cae99120fcba0ffb0016974457bc8d322cf92d5a653a33f77075e046c0aa5778e29789fff1d170eddc5002433b527ef2be8e85043015f89cdea881d9855b2047fdcef0e9d8c50e9fed623ecebd2e45ffd45425753b4bf8350b303ccec3701d86ff877d83b5570f1e9cf1f06bd6393070b6c09b09fc35b3b95eb3101d339be266ba2a3e8c05b5b0457aebc111fafea3e12b609732c0a64ad89bba1cd4bf36458cfa4f84f43f45a9f05ed89c01214bdd686683c2fd1187a29f3fa20b75cf2acf486154d967b6062d14ab847fb73e08e9984d058d1fddefeaf73c749b3eed06d9007180a0251cf2eddd2678d175828ba09c90884c4687cbb75e7f06f06ac2c8f5ebb502778444c24c80ca0e1415cf8a2cbe248d4fd712afb33bf4d44206089b2ce0fbf710b409fce14271f2085687e3b93ad84a2894a63d90bd63a7258918f0dbd225f58", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:41 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:41 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x900000000000000, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:41 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2800000000000000]}, 0x10) 07:30:41 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x165f0c00]}, 0x6) 07:30:41 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000580)={{{@in, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f00000000c0)=0xe8) r4 = getpgid(0xffffffffffffffff) fstat(r0, &(0x7f0000001e40)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x4, &(0x7f0000001ec0)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]) r7 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001f00)={0x0, 0x0}, &(0x7f0000001f40)=0xc) r9 = getegid() r10 = getpid() stat(&(0x7f0000001f80)='./file0\x00', &(0x7f0000001fc0)={0x0, 0x0, 0x0, 0x0, 0x0}) r12 = getgid() ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002040)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002080)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000002180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000021c0)={0x0, 0x0, 0x0}, &(0x7f0000002200)=0xc) fcntl$getownex(r0, 0x10, &(0x7f0000002240)={0x0, 0x0}) r17 = getuid() lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r19 = gettid() stat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000002400)='./file0\x00', &(0x7f0000002440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r0, &(0x7f0000002600)={&(0x7f0000000000)=@kern={0x10, 0x0, 0x0, 0x10008000}, 0xc, &(0x7f0000001e00)=[{&(0x7f0000000140)={0x1b0, 0x28, 0x210, 0x70bd28, 0x25dfdbfc, "", [@typed={0x8c, 0x44, @binary="d40ab8c45edf3c58a489f2cb139e08f5ca41b5346a7b9011896451798f656b993077b255268b3c2c3600d3594ed9e2601b5a51c6403ae3f8525d075b96e43716d1e0d287ee4657834e74d64c1cdeb86e3a4a8f3f4f46f6d94f5cae23d916fe3d4a401a7688c43a2c52461c1b751450d1bb8dfe65d5b251093e47b895bbac4cbef0cde445ff958abd"}, @generic="e10ca4be7871517029135a7c1a3f84e75356c2d756209076d34ca03ce82720ba5a685fc6fb6904ecd0f96f72d311367e6e5f6cd7deadd547391dcacfb258f7571a3daca0687b0d7b59bc49af93c3f47eb3dbfbc83f1e905b256308f51112cae868463785cdaa118990c080b27e1029c7b776b1275ed5b6d346344173d85864eef01926a8e07b34103fd81e1ea81dc93ca6c8d46d3425e2ed6a57770f", @generic="2dd6e3ec42fab6f8de412b4f0347d78d836b3155c500345ca936141ed69e2aa23585d82cb45bfd86a7ab5c9fbcd3ef401df000a3bd574d52328ecc3aa18e319ce3e8e172dfe566abd55da2b26119afa7192f449a4e9937340d221bf41f7205f60b6bf337d7945cf6a5979816735c689af474d427c3e4346d"]}, 0x1b0}, {&(0x7f0000000680)={0x175c, 0x38, 0x8, 0x70bd2a, 0x25dfdbfc, "", [@generic="7bc2894249543b83dae77c197757fccc6e80a359b04defc02fc41a5d3d39d8054da9011aaf098e47c68e4f671663386bad5d3201e9fefff4229e754006c30a3fc57d096d6ec5ea183850dc54f8f653ecbe2ca6ee35cd514a21b9b55bafe4edca53cf5318533ccbda162d8917b1dda85939e9e8d4fd36dae917f872d1a668", @typed={0x8, 0x62, @pid=r1}, @generic="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", @nested={0x128, 0x2b, [@generic="275874288169ca819d14b10e6a34c9152277050229f0560f05f9cc746c0301a0e18678c51952dd2da254a469d3", @typed={0x8, 0x87, @uid=r2}, @generic="4128f39e0b64883ccfadbcfcad71c1673c55cf172fcdb583f1603a9126a8058c5c9a589483ba9094b37dae2f5fe9ed134a4c68298f336cb3cd3fabfca0ae4ed376aac2a1aac7923d55aaf412519a3f84fc69c6e0016f5b32124639833a44b76ba4f24cc90f", @generic="289dedbb46dc252c68f8651f9e9e8b561e92619e491a4161950c2869919db2f0a2b71835c1a4cfb92297b3a2b566e98af9e1f484a381dff7f6bed7103fcf6addfb654b0d023f450f26b097fbe0c935c42f40d9caa8b64b6a541294103b33eb7ec213a25fedb033e02e8b1c3d6246ec2f05548aac4f0009004833952aa85311be07c00f772e1ee8d2edd2"]}, @typed={0x14, 0x4a, @ipv6=@loopback={0x0, 0x1}}, @generic="8e4d36d09f0583445a9058", @nested={0x2e4, 0x49, [@generic="71560587abb10475ab5400bb5d9648605243a8a89d473148bea95ef1fa6d391a775f2cae9355a6015e48d63c0f914d394ef8f66aa94cb697a9bf92fe0afc191c3f38e935747ece02db901da7eadc35e24bcf2c6af8bd673c7a85b8e7573ac1894b3a4c5f4036dba0e75ccae6891eae6d366d90bfc65055a3151ed04e4977a04d8002bc4bf95a718d9e639a47e76096b8d2335b928d7b6410b614aedae5287595c848e5df7a04936733bd4ce0f7", @typed={0xc, 0x1f, @str='keyring\x00'}, @typed={0x8, 0x52, @u32=0x1}, @typed={0x30, 0x76, @str='*{vmnet1ppp0\\mime_type+keyringproc%wlan1\x00'}, @generic="3a78b3bacd2ddcb88211c2433003fb83c3500c0650cfe85b08b09c07147ba52175286197e842d9bc6ec1ef245eea124dc8c5a1968053ce56712299ebf380ad83367fe5bac3344f992ce62b66498c5925d327fe9a2581c774b9e3317a7c749df759fcb9f465b001531ecb324f8ee47f111582afcf4543dbcf00ddef653b89d46f1533f2483ea0a2205efe714cf65263f247f90b194a15123f12f5ed6cc228dde797b1ae4098272e656ed8c6ff", @generic="8052cc32f2853b10d30e7d67bfda4358e9b5d85d1aa2fc9853b1bb50888d3bcfc07c48e2fd84c05d2e23d726fabe8f3ae55f9e4d6f96fdcc3515ee7a60b82d819373fc420ac8463254dc53fc69564879d01f6f2a14607afc6f3513bcb04bec9748004c0cc3f500195b7a96b42230", @typed={0x8, 0x7a, @uid=r3}, @generic="2ed167527dd2e53b9a080628a919c033f1e63683ff0ffbba071fea3e078fdff1a595914d1a403ffd1062ab0c7b874f206ae8a626d1745855ef441a46a959a9f065fc7a0d3743710b82bcc946a46f8a635583f1c3835f107ea6812b9636970dcaaab509f6b5e561fd4313285883fe48b491c4f048524584d174e7918c6854995e2b400279230d56d78d8ebc3dbf877013445808a7360d3f73d487ca500f8d57190210f39dac0c1d09f4e82f7e867da9277e48b398222a82cdbf350542c9585ec391528b16", @typed={0x8, 0x69, @fd=r0}]}, @nested={0x198, 0x67, [@generic="0e255e1f57dd3eabd3d30294402f6f3381386840929f8d5c1d3c747f2f032c14b2c99e3d72e7eaf291c31164313454b71c42482182d99b13769178531bbaced4afeca319951c8262ab49736ec1ec171ac011f1b3e9c594499e038f0917", @generic="d78f00bc71fd22cbf2e981b7872d5d1f66c76be08a5b6520850b37ad193d1d15fae1acfc4077717106969064604460e5d0c4f3f611fe9550dab889fbde38a920f8b72ce60c4064e54a9f818b684d418dbb7364917bcfe7f93522d9875dd3ff198e874d02aa93917ba52273661cc56bf330eb568b4e0746009f5317150d334491c68f9f15ea0adc760ac1347bffcd2d702fc7368991f1e0854d2e27ac8ef713e4e43a8e37a0c1a7f5fd4a3225351584b9b0c0e0aea7e5190d6b501be592c4f0cd61a5108f3a512ec8417cdac1efc600f84ac8b7199d2b156c8604c0546efa7a860cf895458bd82114e49600a2677b35ca43e4ff60", @generic="1aabab968031b7ec", @generic="a7a6d519a6cb245052fc538048370d38ed3b05c712a7715c923e43c769b1b62af53c48dcd83806c0a63fb442e636d52ed39232c376806dc19eaf4e"]}, @nested={0x100, 0x39, [@generic="c9eba7eab4306f1821158c3211d93ea08fc5a6aff69a37acd8600c89062a6a40a59550a3776fa3f2ddd0f36d16f18c24c9f491b3fc0300fb960c9545bc2b629c962a3d66b643d97a206305335d21fbdc361b0c8c36810a8ef2778c0b15eddb25bcb668cbb79b54f77ee63f47f7b435711eb9f086251211cac2f0a24591252b75440415104a6d7688235842d373584a0f3b0fc7329059560d590aa4b4f8f1c700a0322c420ba697dcd97ca928edb66eacb1732a88d943efa204573e088cdceeae40d6afa1ea6d69de7b3a456275c40799cf82ff8095fb01ac", @generic="f0baa46a83c0c373977f86f4ff4b7715e3f04fc97e13c1f982169523794868afb52622"]}]}, 0x175c}], 0x2, &(0x7f00000024c0)=[@cred={0x20, 0x1, 0x2, r4, r5, r6}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r7, r8, r9}, @rights={0x10, 0x1, 0x1}, @cred={0x20, 0x1, 0x2, r10, r11, r12}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r13, r14, r15}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r16, r17, r18}, @cred={0x20, 0x1, 0x2, r19, r20, r21}], 0x140, 0x4}, 0x24000000) sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) 07:30:41 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:41 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000004c00000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) [ 1327.400244] binder: undelivered TRANSACTION_ERROR: 29201 [ 1327.459406] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:42 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="19414e544653202020205182f8076d368b2cb0c9625ca1f01e130acdf807c3ad1119b66ba934fbaf617d53c629cd4a70462ec085165dc16b3e3792a7fc796eca0273b16b7081451731822a058184dc3f1262cb522db8c40ed534337e3746b6c91d5b0e7044e4af3596c29a5aab078c04463d4e5a6dd03fafa3232875ba90d49f90bdf430e98c0908a0e30d48efe0c58baade4b91d4124f25db0dff1e8e6c57aa14d93c91afa441cd8a9793e488383a97bbcb38e983843814200cca6c2cae99120fcba0ffb0016974457bc8d322cf92d5a653a33f77075e046c0aa5778e29789fff1d170eddc5002433b527ef2be8e85043015f89cdea881d9855b2047fdcef0e9d8c50e9fed623ecebd2e45ffd45425753b4bf8350b303ccec3701d86ff877d83b5570f1e9cf1f06bd6393070b6c09b09fc35b3b95eb3101d339be266ba2a3e8c05b5b0457aebc111fafea3e12b609732c0a64ad89bba1cd4bf36458cfa4f84f43f45a9f05ed89c01214bdd686683c2fd1187a29f3fa20b75cf2acf486154d967b6062d14ab847fb73e08e9984d058d1fddefeaf73c749b3eed06d9007180a0251cf2eddd2678d175828ba09c90884c4687cbb75e7f06f06ac2c8f5ebb502778444c24c80ca0e1415cf8a2cbe248d4fd712afb33bf4d44206089b2ce0fbf710b409fce14271f2085687e3b93ad84a2894a63d90bd63a7258918f0dbd225f58", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:42 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:42 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xe00]}, 0x6) [ 1327.548169] ISOFS: Unable to identify CD-ROM format. 07:30:42 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000000096e00000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:42 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000380)=[@in={0x2, 0x4e21, @rand_addr=0xffffffffffffffff}, @in6={0xa, 0x4e22, 0x2, @local={0xfe, 0x80, [], 0xaa}, 0x81}, @in6={0xa, 0x4e24, 0x40, @remote={0xfe, 0x80, [], 0xbb}, 0x5}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1c}}, @in6={0xa, 0x4e22, 0x101, @remote={0xfe, 0x80, [], 0xbb}, 0x80}, @in6={0xa, 0x4e22, 0x3ff, @dev={0xfe, 0x80, [], 0x1f}, 0x1}, @in6={0xa, 0x4e23, 0x2, @local={0xfe, 0x80, [], 0xaa}, 0x6}, @in={0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}], 0xbc) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, &(0x7f0000000000)=""/219, &(0x7f00000002c0)=0xdb) r2 = fcntl$dupfd(r0, 0x406, r0) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000340)=0x4) 07:30:42 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x4c000000, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) [ 1327.626901] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:42 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3400000000000000]}, 0x10) 07:30:42 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:42 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:42 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a0000000000fcfdffff00000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:42 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) [ 1327.839906] ISOFS: Unable to identify CD-ROM format. [ 1327.854226] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:42 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xc5f11]}, 0x6) 07:30:42 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:42 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000006c00000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:42 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:42 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x10) 07:30:42 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) 07:30:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:42 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x520c0300, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:42 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:42 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1328.036174] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:42 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a000000000000000000c0ed0000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:42 executing program 6: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000080)=0x40, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") r2 = creat(&(0x7f0000000000)='./file0\x00', 0x20) ioctl$EVIOCSREP(r2, 0x40084503, &(0x7f0000000040)=[0x1, 0x3]) bind$netrom(r2, &(0x7f00000001c0)=@ax25={0x3, {"fe1de188872585"}, 0x4}, 0x10) sendmsg$nl_generic(r1, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) 07:30:42 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x6) [ 1328.090984] ISOFS: Unable to identify CD-ROM format. 07:30:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, "00000000000000000000000000000000000000000000000000000000007fffff", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:42 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:42 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x4000000, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:42 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000]}, 0x10) 07:30:42 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="19414e544653202020205182f8076d368b2cb0c9625ca1f01e1305cdf807c3ad1119b66ba934fbaf617d53c629cd4a70462ec085165dc16b3e3792a7fc796eca0273b16b7081451731822a058184dc3f1262cb522db8c40ed534337e3746b6c91d5b0e7044e4af3596c29a5aab078c04463d4e5a6dd03fafa3232875ba90d49f90bdf430e98c0908a0e30d48efe0c58baade4b91d4124f25db0dff1e8e6c57aa14d93c91afa441cd8a9793e488383a97bbcb38e983843814200cca6c2cae99120fcba0ffb0016974457bc8d322cf92d5a653a33f77075e046c0aa5778e29789fff1d170eddc5002433b527ef2be8e85043015f89cdea881d9855b2047fdcef0e9d8c50e9fed623ecebd2e45ffd45425753b4bf8350b303ccec3701d86ff877d83b5570f1e9cf1f06bd6393070b6c09b09fc35b3b95eb3101d339be266ba2a3e8c05b5b0457aebc111fafea3e12b609732c0a64ad89bba1cd4bf36458cfa4f84f43f45a9f05ed89c01214bdd686683c2fd1187a29f3fa20b75cf2acf486154d967b6062d14ab847fb73e08e9984d058d1fddefeaf73c749b3eed06d9007180a0251cf2eddd2678d175828ba09c90884c4687cbb75e7f06f06ac2c8f5ebb502778444c24c80ca0e1415cf8a2cbe248d4fd712afb33bf4d44206089b2ce0fbf710b409fce14271f2085687e3b93ad84a2894a63d90bd63a7258918f0dbd225f58", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:42 executing program 6: r0 = memfd_create(&(0x7f0000000340)='/dev/audio\x00', 0x2) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f0000000380)={0x6, 0x5, 0x4, 0x20}) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r1, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x2000, 0x0) getsockopt$bt_sco_SCO_CONNINFO(r2, 0x11, 0x2, &(0x7f0000000040)=""/74, &(0x7f00000000c0)=0x4a) 07:30:42 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe]}, 0x6) 07:30:42 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000000100000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) [ 1328.305528] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:42 executing program 6: socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0xffffffffffffffff, 0x6, 0x1, 0xc5d, &(0x7f0000000000)=[0x0], 0x1}, 0x20) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000240)=0xac) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000003c0)={&(0x7f00000004c0)={0xa0, r1, 0x300, 0x70bd2a, 0x25dfdbfd, {0x5}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x76}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5cd}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffffffffffffffff}, @IPVS_CMD_ATTR_DEST={0x5c, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x80}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast2={0xff, 0x2, [], 0x1}}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xff}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@dev={0xfe, 0x80, [], 0x1a}}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xe3}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x10000}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x58}]}, 0xa0}, 0x1, 0x0, 0x0, 0x20008010}, 0x8000) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f00000001c0)={0x8, 0xfff, 0x2, 0x10000}, 0x6) 07:30:42 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xc5f18]}, 0x6) 07:30:42 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a0000000000fffffff600000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:42 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) [ 1328.439920] ISOFS: Unable to identify CD-ROM format. 07:30:43 executing program 4: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x6c260000, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:43 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xffffffffffffffc0, 0x2200) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) ioctl$sock_bt(r1, 0x0, &(0x7f0000000080)="e754bea0c4d792a28d874de8be8bd3a2f5c092f36ca6cdf5d2602cd9ae04ecc3fa84") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) [ 1328.497659] __ntfs_warning: 254 callbacks suppressed [ 1328.497670] ntfs: (device loop2): is_boot_sector_ntfs(): Invalid boot sector checksum. [ 1328.510932] ntfs: (device loop2): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 1328.519371] ntfs: (device loop2): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 1328.530489] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1328.531464] ntfs: (device loop2): ntfs_fill_super(): Not an NTFS volume. [ 1328.542784] ntfs: (device loop7): is_boot_sector_ntfs(): Invalid boot sector checksum. [ 1328.554372] ntfs: (device loop7): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 1328.562804] ntfs: (device loop7): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 1328.574875] ntfs: (device loop7): ntfs_fill_super(): Not an NTFS volume. [ 1328.612250] ntfs: (device loop7): is_boot_sector_ntfs(): Invalid boot sector checksum. [ 1328.620370] ntfs: (device loop7): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 1328.699103] ISOFS: Unable to identify CD-ROM format. 07:30:43 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x52]}, 0x6) 07:30:43 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}, 0x10) 07:30:43 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="1941b722a7a6d34535fd5182f8076d368b2cb0c9625ca1f01e1308cdf807c3ad1119b66ba934fbaf617d53c629cd4a70462ec085165dc16b3e3792a7fc796eca0273b16b7081451731822a058184dc3f1262cb522db8c40ed534337e3746b6c91d5b0e7044e4af3596c29a5aab078c04463d4e5a6dd03fafa3232875ba90d49f90bdf430e98c0908a0e30d48efe0c58baade4b91d4124f25db0dff1e8e6c57aa14d93c91afa441cd8a9793e488383a97bbcb38e983843814200cca6c2cae99120fcba0ffb0016974457bc8d322cf92d5a653a33f77075e046c0aa5778e29789fff1d170eddc5002433b527ef2be8e85043015f89cdea881d9855b2047fdcef0e9d8c50e9fed623ecebd2e45ffd45425753b4bf8350b303ccec3701d86ff877d83b5570f1e9cf1f06bd6393070b6c09b09fc35b3b95eb3101d339be266ba2a3e8c05b5b0457aebc111fafea3e12b609732c0a64ad89bba1cd4bf36458cfa4f84f43f45a9f05ed89c01214bdd686683c2fd1187a29f3fa20b75cf2acf486154d967b6062d14ab847fb73e08e9984d058d1fddefeaf73c749b3eed06d9007180a0251cf2eddd2678d175828ba09c90884c4687cbb75e7f06f06ac2c8f5ebb502778444c24c80ca0e1415cf8a2cbe248d4fd712afb33bf4d44206089b2ce0fbf710b409fce14271f2085687e3b93ad84a2894a63d90bd63a7258918f0dbd225f58", 0x1ff, 0x1}], 0x6c00, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:43 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000140)={0x3, {{0x2, 0x4e22, @broadcast=0xffffffff}}, 0x0, 0x1, [{{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x16}}}]}, 0x110) sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="ceff00002e00fd060000000000000000030000000c00000008000900000000008d583a00000000000000000093ce1dca685d6fb63fc532596b9384bc23011fb25786a8b00a356c0007e89b488f3414601b531be41a584bdb38038d4948cde8d1abbd22da808e899d028851e7a0b13e1d48a4b0a3dfc04f028c5a8173b69651d4e99fc7958ba4575469919f721c74d3eae6e9b977c8b3f6e38e7a41aac49304affd4a311ea5552bb71e6d3cd0c15583e9590f688df46c558de8bc91d700433a58bc0990ba8d26b44f00c750bcf726cf894f1ff046f424bc2aa338a39b44e1437968c1acf5fb8d13f7bf0d303740c7b184e8eb58380d3245899e59cd551e1304f31d08c9434baab3a63fd9b6cffeeac0347fbfa2534e7b27acab45c7c44bc5"], 0x1}, 0x1}, 0x0) 07:30:43 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000006800000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:43 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:43 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) [ 1328.835383] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:43 executing program 6: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0xffffffffffffff9c, 0x6, 0x1, 0x1, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000080)={0x8, 0x10001}) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r1, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) 07:30:43 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:43 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000007fffffffffffffff000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) [ 1328.909434] ISOFS: Unable to identify CD-ROM format. 07:30:43 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf401]}, 0x6) 07:30:43 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x91ffffff00000000]}, 0x10) 07:30:43 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a0000006c000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:43 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="1941b722a7a6d34535fd5182f8076d368b2cb0c9625ca1f01e1308cdf807c3ad1119b66ba934fbaf617d53c629cd4a70462ec085165dc16b3e3792a7fc796eca0273b16b7081451731822a058184dc3f1262cb522db8c40ed534337e3746b6c91d5b0e7044e4af3596c29a5aab078c04463d4e5a6dd03fafa3232875ba90d49f90bdf430e98c0908a0e30d48efe0c58baade4b91d4124f25db0dff1e8e6c57aa14d93c91afa441cd8a9793e488383a97bbcb38e983843814200cca6c2cae99120fcba0ffb0016974457bc8d322cf92d5a653a33f77075e046c0aa5778e29789fff1d170eddc5002433b527ef2be8e85043015f89cdea881d9855b2047fdcef0e9d8c50e9fed623ecebd2e45ffd45425753b4bf8350b303ccec3701d86ff877d83b5570f1e9cf1f06bd6393070b6c09b09fc35b3b95eb3101d339be266ba2a3e8c05b5b0457aebc111fafea3e12b609732c0a64ad89bba1cd4bf36458cfa4f84f43f45a9f05ed89c01214bdd686683c2fd1187a29f3fa20b75cf2acf486154d967b6062d14ab847fb73e08e9984d058d1fddefeaf73c749b3eed06d9007180a0251cf2eddd2678d175828ba09c90884c4687cbb75e7f06f06ac2c8f5ebb502778444c24c80ca0e1415cf8a2cbe248d4fd712afb33bf4d44206089b2ce0fbf710b409fce14271f2085687e3b93ad84a2894a63d90bd63a7258918f0dbd225f58", 0x1ff, 0x1}], 0xffffffffffffffff, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:43 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) epoll_create(0x9) r1 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x2000, 0x80) ioctl$SG_GET_KEEP_ORPHAN(r1, 0x2288, &(0x7f0000000040)) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) [ 1329.022325] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1329.144545] ISOFS: Unable to identify CD-ROM format. 07:30:43 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000000004000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:43 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:43 executing program 4: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x7000000, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:43 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) r1 = shmget(0x1, 0x3000, 0x1, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT(r1, 0xd, &(0x7f0000000000)=""/136) 07:30:43 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3e8]}, 0x6) 07:30:43 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0xffffff8c, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:43 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000]}, 0x10) [ 1329.252957] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:43 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:43 executing program 6: socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") r0 = syz_open_dev$audion(&(0x7f0000000200)='/dev/audio#\x00', 0x9, 0x20000) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000040)={0x0, 0x7, 0x4, 0xa3, 0x6ee, 0x5, 0x0, 0x0, {0x0, @in={{0x2, 0x4e21}}, 0x1, 0x8, 0x26e9, 0x2, 0x6a}}, &(0x7f0000000140)=0xb0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000180)={r1, 0x2}, &(0x7f00000001c0)=0x8) 07:30:43 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000009000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:43 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000003000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) [ 1329.361870] ISOFS: Unable to identify CD-ROM format. 07:30:43 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xc5f10]}, 0x6) 07:30:43 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcbff]}, 0x10) 07:30:43 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="1941b722a7a6d34535fd5182f8076d368b2cb0c9625ca1f01e1308cdf807c3ad1119b66ba934fbaf617d53c629cd4a70462ec085165dc16b3e3792a7fc796eca0273b16b7081451731822a058184dc3f1262cb522db8c40ed534337e3746b6c91d5b0e7044e4af3596c29a5aab078c04463d4e5a6dd03fafa3232875ba90d49f90bdf430e98c0908a0e30d48efe0c58baade4b91d4124f25db0dff1e8e6c57aa14d93c91afa441cd8a9793e488383a97bbcb38e983843814200cca6c2cae99120fcba0ffb0016974457bc8d322cf92d5a653a33f77075e046c0aa5778e29789fff1d170eddc5002433b527ef2be8e85043015f89cdea881d9855b2047fdcef0e9d8c50e9fed623ecebd2e45ffd45425753b4bf8350b303ccec3701d86ff877d83b5570f1e9cf1f06bd6393070b6c09b09fc35b3b95eb3101d339be266ba2a3e8c05b5b0457aebc111fafea3e12b609732c0a64ad89bba1cd4bf36458cfa4f84f43f45a9f05ed89c01214bdd686683c2fd1187a29f3fa20b75cf2acf486154d967b6062d14ab847fb73e08e9984d058d1fddefeaf73c749b3eed06d9007180a0251cf2eddd2678d175828ba09c90884c4687cbb75e7f06f06ac2c8f5ebb502778444c24c80ca0e1415cf8a2cbe248d4fd712afb33bf4d44206089b2ce0fbf710b409fce14271f2085687e3b93ad84a2894a63d90bd63a7258918f0dbd225f58", 0x1ff, 0x1}], 0xfdfdffff00000000, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) [ 1329.422263] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1329.586590] ISOFS: Unable to identify CD-ROM format. 07:30:44 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000000)={{{@in=@multicast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000180)={'team0\x00', r1}) 07:30:44 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:44 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000008000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:44 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000000000000000002000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, "0000000000000000000000000000000000000000000000000000000000000005", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:44 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf401000000000000]}, 0x6) 07:30:44 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="1941b722a7a6d34535fd5182f8076d368b2cb0c9625ca1f01e1308cdf807c3ad1119b66ba934fbaf617d53c629cd4a70462ec085165dc16b3e3792a7fc796eca0273b16b7081451731822a058184dc3f1262cb522db8c40ed534337e3746b6c91d5b0e7044e4af3596c29a5aab078c04463d4e5a6dd03fafa3232875ba90d49f90bdf430e98c0908a0e30d48efe0c58baade4b91d4124f25db0dff1e8e6c57aa14d93c91afa441cd8a9793e488383a97bbcb38e983843814200cca6c2cae99120fcba0ffb0016974457bc8d322cf92d5a653a33f77075e046c0aa5778e29789fff1d170eddc5002433b527ef2be8e85043015f89cdea881d9855b2047fdcef0e9d8c50e9fed623ecebd2e45ffd45425753b4bf8350b303ccec3701d86ff877d83b5570f1e9cf1f06bd6393070b6c09b09fc35b3b95eb3101d339be266ba2a3e8c05b5b0457aebc111fafea3e12b609732c0a64ad89bba1cd4bf36458cfa4f84f43f45a9f05ed89c01214bdd686683c2fd1187a29f3fa20b75cf2acf486154d967b6062d14ab847fb73e08e9984d058d1fddefeaf73c749b3eed06d9007180a0251cf2eddd2678d175828ba09c90884c4687cbb75e7f06f06ac2c8f5ebb502778444c24c80ca0e1415cf8a2cbe248d4fd712afb33bf4d44206089b2ce0fbf710b409fce14271f2085687e3b93ad84a2894a63d90bd63a7258918f0dbd225f58", 0x1ff, 0x1}], 0x68000000, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:44 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}, 0x10) 07:30:44 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x80080) ioctl$IOC_PR_PREEMPT_ABORT(r1, 0x401870cc, &(0x7f0000000040)={0x0, 0x38, 0xc866, 0x89}) [ 1329.678322] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:44 executing program 4 (fault-call:1 fault-nth:0): perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:44 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:44 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000000000000000005000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) [ 1329.796001] ISOFS: Unable to identify CD-ROM format. [ 1329.813493] FAULT_INJECTION: forcing a failure. [ 1329.813493] name failslab, interval 1, probability 0, space 0, times 0 [ 1329.824887] CPU: 1 PID: 7562 Comm: syz-executor4 Not tainted 4.17.0+ #95 [ 1329.831731] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1329.841088] Call Trace: [ 1329.843701] dump_stack+0x1b9/0x294 [ 1329.847346] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1329.852537] ? zap_class+0x720/0x720 [ 1329.856251] should_fail.cold.4+0xa/0x1a [ 1329.860306] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1329.865416] ? print_usage_bug+0xc0/0xc0 [ 1329.869474] ? find_held_lock+0x36/0x1c0 [ 1329.873536] ? check_same_owner+0x320/0x320 [ 1329.877844] ? rcu_note_context_switch+0x710/0x710 [ 1329.882763] ? debug_check_no_locks_freed+0x310/0x310 [ 1329.887940] __should_failslab+0x124/0x180 [ 1329.892177] should_failslab+0x9/0x14 [ 1329.895978] kmem_cache_alloc_trace+0x2cb/0x780 [ 1329.900641] ? perf_trace_lock+0xd6/0x900 [ 1329.904777] ? __lock_acquire+0x7f5/0x5140 [ 1329.909001] perf_event_alloc.part.93+0x195/0x3090 [ 1329.913920] ? debug_check_no_locks_freed+0x310/0x310 [ 1329.919100] ? find_get_context.isra.94+0x720/0x720 [ 1329.924105] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1329.929108] ? expand_files.part.8+0x56f/0x9a0 [ 1329.933677] ? find_held_lock+0x36/0x1c0 [ 1329.937731] ? lock_downgrade+0x8e0/0x8e0 [ 1329.941878] ? kasan_check_read+0x11/0x20 [ 1329.946008] ? do_raw_spin_unlock+0x9e/0x2e0 [ 1329.950398] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 1329.954966] ? __lock_is_held+0xb5/0x140 [ 1329.959029] ? _raw_spin_unlock+0x22/0x30 [ 1329.963168] ? __alloc_fd+0x346/0x700 [ 1329.966957] ? exit_files+0xb0/0xb0 [ 1329.970571] ? lock_release+0xa10/0xa10 [ 1329.974531] ? check_same_owner+0x320/0x320 [ 1329.978838] ? __check_object_size+0x95/0x5d9 [ 1329.983324] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1329.988855] ? cap_capable+0x1f9/0x260 [ 1329.992732] ? get_unused_fd_flags+0x121/0x190 [ 1329.997302] ? __alloc_fd+0x700/0x700 [ 1330.001087] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1330.006615] __do_sys_perf_event_open+0xa8c/0x30c0 [ 1330.011547] ? kasan_check_write+0x14/0x20 [ 1330.015767] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 1330.020685] ? perf_event_set_output+0x660/0x660 [ 1330.025437] ? __sb_end_write+0xac/0xe0 [ 1330.029396] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1330.034926] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 1330.039755] __x64_sys_perf_event_open+0xbe/0x150 [ 1330.044581] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1330.049583] do_syscall_64+0x1b1/0x800 [ 1330.053455] ? finish_task_switch+0x1ca/0x840 [ 1330.057945] ? syscall_return_slowpath+0x5c0/0x5c0 [ 1330.062860] ? syscall_return_slowpath+0x30f/0x5c0 [ 1330.067776] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 1330.073127] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1330.077961] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1330.083132] RIP: 0033:0x4559f9 [ 1330.086299] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1330.105552] RSP: 002b:00007faf583cdc68 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1330.113246] RAX: ffffffffffffffda RBX: 00007faf583ce6d4 RCX: 00000000004559f9 [ 1330.120497] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000100 [ 1330.127763] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1330.135017] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000014 07:30:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:44 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x6) 07:30:44 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x330e3080]}, 0x10) [ 1330.142278] R13: 00000000004c0414 R14: 00000000004cf890 R15: 0000000000000000 07:30:44 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) [ 1330.184864] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:44 executing program 4 (fault-call:1 fault-nth:1): perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:44 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="1941b722a7a6d34535fd5182f8076d368b2cb0c9625ca1f01e1308cdf807c3ad1119b66ba934fbaf617d53c629cd4a70462ec085165dc16b3e3792a7fc796eca0273b16b7081451731822a058184dc3f1262cb522db8c40ed534337e3746b6c91d5b0e7044e4af3596c29a5aab078c04463d4e5a6dd03fafa3232875ba90d49f90bdf430e98c0908a0e30d48efe0c58baade4b91d4124f25db0dff1e8e6c57aa14d93c91afa441cd8a9793e488383a97bbcb38e983843814200cca6c2cae99120fcba0ffb0016974457bc8d322cf92d5a653a33f77075e046c0aa5778e29789fff1d170eddc5002433b527ef2be8e85043015f89cdea881d9855b2047fdcef0e9d8c50e9fed623ecebd2e45ffd45425753b4bf8350b303ccec3701d86ff877d83b5570f1e9cf1f06bd6393070b6c09b09fc35b3b95eb3101d339be266ba2a3e8c05b5b0457aebc111fafea3e12b609732c0a64ad89bba1cd4bf36458cfa4f84f43f45a9f05ed89c01214bdd686683c2fd1187a29f3fa20b75cf2acf486154d967b6062d14ab847fb73e08e9984d058d1fddefeaf73c749b3eed06d9007180a0251cf2eddd2678d175828ba09c90884c4687cbb75e7f06f06ac2c8f5ebb502778444c24c80ca0e1415cf8a2cbe248d4fd712afb33bf4d44206089b2ce0fbf710b409fce14271f2085687e3b93ad84a2894a63d90bd63a7258918f0dbd225f58", 0x1ff, 0x1}], 0x8, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:44 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:44 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a0000000000001fffff00000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:44 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe]}, 0x10) 07:30:44 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) r1 = msgget$private(0x0, 0x200) msgctl$IPC_RMID(r1, 0x0) 07:30:44 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xc5f0a]}, 0x6) [ 1330.362499] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1330.382598] FAULT_INJECTION: forcing a failure. [ 1330.382598] name failslab, interval 1, probability 0, space 0, times 0 [ 1330.394001] CPU: 0 PID: 7591 Comm: syz-executor4 Not tainted 4.17.0+ #95 [ 1330.400857] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1330.410226] Call Trace: [ 1330.412841] dump_stack+0x1b9/0x294 [ 1330.416499] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1330.421742] should_fail.cold.4+0xa/0x1a [ 1330.425851] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1330.430989] ? do_raw_spin_unlock+0x9e/0x2e0 [ 1330.435420] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 1330.440038] ? find_held_lock+0x36/0x1c0 [ 1330.444163] ? check_same_owner+0x320/0x320 [ 1330.448501] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1330.453537] ? expand_files.part.8+0x56f/0x9a0 [ 1330.458138] ? rcu_note_context_switch+0x710/0x710 [ 1330.463101] __should_failslab+0x124/0x180 [ 1330.467360] should_failslab+0x9/0x14 [ 1330.471316] kmem_cache_alloc+0x2af/0x760 [ 1330.475540] ? lock_downgrade+0x8e0/0x8e0 [ 1330.479731] __d_alloc+0xc0/0xd30 [ 1330.483211] ? do_raw_spin_unlock+0x9e/0x2e0 [ 1330.487643] ? shrink_dcache_for_umount+0x290/0x290 [ 1330.492682] ? __lock_is_held+0xb5/0x140 [ 1330.496789] ? _raw_spin_unlock+0x22/0x30 [ 1330.500966] ? __alloc_fd+0x346/0x700 [ 1330.504804] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1330.510360] ? cap_capable+0x1f9/0x260 [ 1330.514273] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1330.519825] ? get_ctx+0x117/0x190 [ 1330.523378] ? perf_event_set_filter+0x1230/0x1230 [ 1330.528330] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1330.533894] d_alloc_pseudo+0x1d/0x30 [ 1330.537721] anon_inode_getfile+0x1e2/0x4c0 [ 1330.542073] ? reverse_path_check_proc.cold.23+0x1f/0x1f [ 1330.547548] ? get_unused_fd_flags+0x121/0x190 [ 1330.552146] ? __alloc_fd+0x700/0x700 [ 1330.555966] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1330.561533] __do_sys_perf_event_open+0x176a/0x30c0 [ 1330.566581] ? kasan_check_write+0x14/0x20 [ 1330.570882] ? perf_event_set_output+0x660/0x660 [ 1330.575693] ? __sb_end_write+0xac/0xe0 [ 1330.579694] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1330.585285] __x64_sys_perf_event_open+0xbe/0x150 [ 1330.586720] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1330.590136] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1330.590162] do_syscall_64+0x1b1/0x800 [ 1330.590178] ? finish_task_switch+0x1ca/0x840 [ 1330.590200] ? syscall_return_slowpath+0x5c0/0x5c0 [ 1330.590222] ? syscall_return_slowpath+0x30f/0x5c0 [ 1330.590249] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 1330.590277] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1330.631306] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1330.636509] RIP: 0033:0x4559f9 [ 1330.639705] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 07:30:45 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:45 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) r1 = dup2(r0, r0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000000)={@my=0x1}) 07:30:45 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0x6) 07:30:45 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x6) 07:30:45 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) [ 1330.659370] RSP: 002b:00007faf583cdc68 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1330.667096] RAX: ffffffffffffffda RBX: 00007faf583ce6d4 RCX: 00000000004559f9 [ 1330.674380] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000100 [ 1330.681657] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1330.688940] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000014 [ 1330.696216] R13: 00000000004c0414 R14: 00000000004cf890 R15: 0000000000000001 07:30:45 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:45 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a0000000000003f000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) [ 1330.793500] ISOFS: Unable to identify CD-ROM format. [ 1330.807752] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:45 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) exit(0x7) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x401, 0x200001) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000040)=0x553742f27cae512, 0x4) 07:30:45 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x105f0c0000000000]}, 0x6) 07:30:45 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x1fffff, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:45 executing program 4 (fault-call:1 fault-nth:2): perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:45 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}, 0x10) 07:30:45 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:45 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000800000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:45 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:45 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) [ 1330.984232] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:45 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) [ 1331.050540] ISOFS: Unable to identify CD-ROM format. 07:30:45 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000000001000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:45 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000]}, 0x6) 07:30:45 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3cb1092a00000000]}, 0x10) 07:30:45 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:45 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x4a5, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) [ 1331.136316] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:45 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) [ 1331.250794] FAULT_INJECTION: forcing a failure. [ 1331.250794] name failslab, interval 1, probability 0, space 0, times 0 [ 1331.262261] CPU: 1 PID: 7672 Comm: syz-executor4 Not tainted 4.17.0+ #95 [ 1331.269109] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1331.278469] Call Trace: [ 1331.281070] dump_stack+0x1b9/0x294 [ 1331.284719] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1331.289934] should_fail.cold.4+0xa/0x1a [ 1331.294013] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1331.299139] ? lock_downgrade+0x8e0/0x8e0 [ 1331.303302] ? graph_lock+0x170/0x170 [ 1331.307106] ? find_held_lock+0x36/0x1c0 [ 1331.311182] ? check_same_owner+0x320/0x320 [ 1331.315508] ? graph_lock+0x170/0x170 [ 1331.319320] ? rcu_note_context_switch+0x710/0x710 [ 1331.324257] ? kasan_check_read+0x11/0x20 [ 1331.328414] ? do_raw_spin_unlock+0x9e/0x2e0 [ 1331.332832] __should_failslab+0x124/0x180 [ 1331.337081] should_failslab+0x9/0x14 [ 1331.340891] kmem_cache_alloc+0x2af/0x760 [ 1331.345048] ? find_held_lock+0x36/0x1c0 [ 1331.349122] get_empty_filp+0x125/0x520 [ 1331.353098] ? proc_nr_files+0x60/0x60 [ 1331.356994] ? kasan_check_read+0x11/0x20 [ 1331.361142] ? do_raw_spin_unlock+0x9e/0x2e0 [ 1331.365551] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 1331.370139] ? kasan_check_write+0x14/0x20 [ 1331.374371] ? do_raw_spin_lock+0xc1/0x200 [ 1331.378607] alloc_file+0x24/0x3e0 [ 1331.382150] anon_inode_getfile+0x29a/0x4c0 [ 1331.386474] ? reverse_path_check_proc.cold.23+0x1f/0x1f [ 1331.391926] ? get_unused_fd_flags+0x121/0x190 [ 1331.396507] ? __alloc_fd+0x700/0x700 [ 1331.400309] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1331.405855] __do_sys_perf_event_open+0x176a/0x30c0 [ 1331.410875] ? kasan_check_write+0x14/0x20 [ 1331.415124] ? perf_event_set_output+0x660/0x660 [ 1331.419900] ? __sb_end_write+0xac/0xe0 [ 1331.423882] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1331.429437] __x64_sys_perf_event_open+0xbe/0x150 [ 1331.434281] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1331.439298] do_syscall_64+0x1b1/0x800 [ 1331.443188] ? syscall_return_slowpath+0x5c0/0x5c0 [ 1331.448119] ? syscall_return_slowpath+0x30f/0x5c0 [ 1331.453053] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 1331.458422] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1331.463272] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1331.468457] RIP: 0033:0x4559f9 [ 1331.471635] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1331.491046] RSP: 002b:00007faf583cdc68 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1331.498755] RAX: ffffffffffffffda RBX: 00007faf583ce6d4 RCX: 00000000004559f9 [ 1331.506021] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000100 [ 1331.513283] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1331.520547] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000014 [ 1331.527810] R13: 00000000004c0414 R14: 00000000004cf890 R15: 0000000000000002 [ 1331.542594] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1331.566334] ISOFS: Unable to identify CD-ROM format. 07:30:46 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000000002300000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:46 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}, 0x6) 07:30:46 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:46 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}, 0x10) 07:30:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:46 executing program 4 (fault-call:1 fault-nth:3): perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:46 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="ceff00002e00fd060000000000000000030000000c00000008000900000000008d583a00000000000000000093ce1dca685d6fb63fc532596b9384bc23011fb25786a8b00a356c0007e89b488f3414601b531be41a584bdb38038d4948cde8d1abbd22da808e899d028851e7a0b13e1d48a4b0a3dfc04f028c5a8173b69651d4e99fc7958ba4575469919f721c74d3eae6e9b977c8b3f6e38e7a41aac49304affd4a311ea5552bb71e6d3cd0c15583e9590f688df46c558de8bc91d700433a58bc0990ba8d26b44f00c750bcf726cf894f1ff046f424bc2aa338a39b44e1437968c1acf5fb8d13f7bf0d303740c7b184e8eb58380d3245899e59cd551e1304f31d08c9434baab3a63fd9b6cffeeac0347fbfa2534e7b27acab45c7c44bc5"], 0x1}, 0x1}, 0x0) r1 = fcntl$getown(r0, 0x9) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) setpgid(r1, r2) 07:30:46 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="1941b722a7a6d34535fd5182f8076d368b2cb0c9625ca1f01e1308cdf807c3ad1119b66ba934fbaf617d53c629cd4a70462ec085165dc16b3e3792a7fc796eca0273b16b7081451731822a058184dc3f1262cb522db8c40ed534337e3746b6c91d5b0e7044e4af3596c29a5aab078c04463d4e5a6dd03fafa3232875ba90d49f90bdf430e98c0908a0e30d48efe0c58baade4b91d4124f25db0dff1e8e6c57aa14d93c91afa441cd8a9793e488383a97bbcb38e983843814200cca6c2cae99120fcba0ffb0016974457bc8d322cf92d5a653a33f77075e046c0aa5778e29789fff1d170eddc5002433b527ef2be8e85043015f89cdea881d9855b2047fdcef0e9d8c50e9fed623ecebd2e45ffd45425753b4bf8350b303ccec3701d86ff877d83b5570f1e9cf1f06bd6393070b6c09b09fc35b3b95eb3101d339be266ba2a3e8c05b5b0457aebc111fafea3e12b609732c0a64ad89bba1cd4bf36458cfa4f84f43f45a9f05ed89c01214bdd686683c2fd1187a29f3fa20b75cf2acf486154d967b6062d14ab847fb73e08e9984d058d1fddefeaf73c749b3eed06d9007180a0251cf2eddd2678d175828ba09c90884c4687cbb75e7f06f06ac2c8f5ebb502778444c24c80ca0e1415cf8a2cbe248d4fd712afb33bf4d44206089b2ce0fbf710b409fce14271f2085687e3b93ad84a2894a63d90bd63a7258918f0dbd225f58", 0x1ff, 0x1}], 0x800000000000000, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) [ 1332.051239] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:46 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, "0000000000000000000000000000000000000000000000000000000000000200", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:46 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000000000700000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:46 executing program 6: socket$inet6(0xa, 0x3, 0x8000) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000140)={0x10, 0x34000, 0x0, 0x4}, 0xc, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYRES64=r0], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f00000000c0)={0x4, 0x7}) [ 1332.152664] ISOFS: Unable to identify CD-ROM format. 07:30:46 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28]}, 0x10) 07:30:46 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000]}, 0x6) 07:30:46 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="1941b722a7a6d34535fd5182f8076d368b2cb0c9625ca1f01e1308cdf807c3ad1119b66ba934fbaf617d53c629cd4a70462ec085165dc16b3e3792a7fc796eca0273b16b7081451731822a058184dc3f1262cb522db8c40ed534337e3746b6c91d5b0e7044e4af3596c29a5aab078c04463d4e5a6dd03fafa3232875ba90d49f90bdf430e98c0908a0e30d48efe0c58baade4b91d4124f25db0dff1e8e6c57aa14d93c91afa441cd8a9793e488383a97bbcb38e983843814200cca6c2cae99120fcba0ffb0016974457bc8d322cf92d5a653a33f77075e046c0aa5778e29789fff1d170eddc5002433b527ef2be8e85043015f89cdea881d9855b2047fdcef0e9d8c50e9fed623ecebd2e45ffd45425753b4bf8350b303ccec3701d86ff877d83b5570f1e9cf1f06bd6393070b6c09b09fc35b3b95eb3101d339be266ba2a3e8c05b5b0457aebc111fafea3e12b609732c0a64ad89bba1cd4bf36458cfa4f84f43f45a9f05ed89c01214bdd686683c2fd1187a29f3fa20b75cf2acf486154d967b6062d14ab847fb73e08e9984d058d1fddefeaf73c749b3eed06d9007180a0251cf2eddd2678d175828ba09c90884c4687cbb75e7f06f06ac2c8f5ebb502778444c24c80ca0e1415cf8a2cbe248d4fd712afb33bf4d44206089b2ce0fbf710b409fce14271f2085687e3b93ad84a2894a63d90bd63a7258918f0dbd225f58", 0x1ff, 0x1}], 0x9000000, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) [ 1332.213472] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:46 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) [ 1332.451498] ISOFS: Unable to identify CD-ROM format. [ 1332.463093] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:47 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000700000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:47 executing program 6: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x20100, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f00000001c0)=0x6, 0x4) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000200)={@loopback, 0x0}, &(0x7f0000000240)=0x14) ioctl$void(r0, 0xc0045c79) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000280)=r1) socket$inet6(0xa, 0x5, 0x3) r2 = socket$nl_generic(0x10, 0x3, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x8000, 0x0) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)) sendmsg$nl_generic(r2, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) 07:30:47 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:47 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf4010000]}, 0x6) 07:30:47 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:47 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55a409e700000000]}, 0x10) 07:30:47 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0xa00, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:47 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:47 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a000000000000000000fffffdfd000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) [ 1332.627203] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:47 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5200]}, 0x6) 07:30:47 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="19414e544653202020205182f8076d368b2cb0c9625ca1f01e1308cdf807c3ad1119b66ba934fbaf617d53c629cd4a2e462ec085165dc16b3e3792a7fc796eca0273b16b7081451731822a058184dc3f1262cb522db8c40ed534337e3746b6c91d5b0e7044e4af3596c29a5aab078c04463d4e5a6dd03fafa3232875ba90d49f90bdf430e98c0908a0e30d48efe0c58baade4b91d4124f25db0dff1e8e6c57aa14d93c91afa441cd8a9793e488383a97bbcb38e983843814200cca6c2cae99120fcba0ffb0016974457bc8d322cf92d5a653a33f77075e046c0aa5778e29789fff1d170eddc5002433b527ef2be8e85043015f89cdea881d9855b2047fdcef0e9d8c50e9fed623ecebd2e45ffd45425753b4bf8350b303ccec3701d86ff877d83b5570f1e9cf1f06bd6393070b6c09b09fc35b3b95eb3101d339be266ba2a3e8c05b5b0457aebc111fafea3e12b609732c0a64ad89bba1cd4bf36458cfa4f84f43f45a9f05ed89c01214bdd686683c2fd1187a29f3fa20b75cf2acf486154d967b6062d14ab847fb73e08e9984d058d1fddefeaf73c749b3eed06d9007180a0251cf2eddd2678d175828ba09c90884c4687cbb75e7f06f06ac2c8f5ebb502778444c24c80ca0e1415cf8a2cbe248d4fd712afb33bf4d44206089b2ce0fbf710b409fce14271f2085687e3b93ad84a2894a63d90bd63a7258918f0dbd225f58", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:47 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="ceff00002e00fd060000000000000000030000000c00000008000900000000008d583a00000000000000000093ce1dca685d6fb63fc532596b9384bc23011fb25786a8b00a356c0007e89b488f3414601b531be41a584bdb38038d4948cde8d1abbd22da808e899d028851e7a0b13e1d48a4b0a3dfc04f028c5a8173b69651d4e99fc7958ba4575469919f721c74d3eae6e9b977c8b3f6e38e7a41aac49304affd4a311ea5552bb71e6d3cd0c15583e9590f688df46c558de8bc91d700433a58bc0990ba8d26b44f00c750bcf726cf894f1ff046f424bc2aa338a39b44e1437968c1acf5fb8d13f7bf0d303740c7b184e8eb58380d3245899e59cd551e1304f31d08c9434baab3a63fd9b6cffeeac0347fbfa2534e7b27acab45c7c44bc5"], 0x1}, 0x1}, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000500)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x3c, r2, 0x100, 0x70bd2a, 0x25dfdbfb, {0xc}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1000}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'team_slave_0\x00'}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20040000}, 0x400c040) writev(r1, &(0x7f0000000240)=[{&(0x7f00000000c0)="7b714d3953ed65843528ffda625b1b3a7b9f3332e1a71197e856c9c4328b962fa2fe35983ad00fe05b7d7a41deeba854f51a1f892d8eed1225af82ad66307707", 0x40}, {&(0x7f0000000140)="cfa5aec37c51939a30bb546ec42f485311c2ac51db39f482f8716337a652e80da7914ee5b37e495e85eef86890ebacb5c47948524e9978b2b3d7b9210bf2f69675b8f8e6d303694094a8a252d8632eb63a3979f317b69052d225c9f9d2e1ef3d3f69f353581cad464043647a7aa499d3d9aeacb418e839a1c6136071b1664c5abcb9ba63241025dc2faa8ed52bac3cab64401f128a5de7", 0x97}, {&(0x7f0000000200)="69b47d45e06802c33deeb31dbaf88641566a96dcbd5a31ac1fb16e95ae591e", 0x1f}], 0x3) 07:30:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:47 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3cb1092a]}, 0x10) [ 1332.792917] ISOFS: Unable to identify CD-ROM format. 07:30:47 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x8, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1332.852753] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:47 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a000000000000000000001fffff000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:47 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:47 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="ceff00002e00fd060000000000000000030000000c00000008000900000000008d583a39c33edc000000001723b1eae6363fd8b63fc532596b9384bc23011fb25786a8b00a356c0007e89b488f3414601b531be41a584bdb38038d4948cde8d1abbd22da808e899d028851e7a0b13e1d48a4b0a3dfc04f028c5a8173b69651d4e99fc7958ba457546b919f721c74d3eae6e9b977c8b3f6e38e7a41aac49304affd4a311ea5552bb71e6d3cd0c15583e9590f688df44b558de8bc91d700433a58bc09909a8d26b44e00c750bcf726cf894f1ff046f424bc2aa338a39b44e143796515c8591ab74b43a08703351288b54268c1acf5fb8d13f7bf0d303740c7b184e8eb58380d3245899e59cd551e1304f31d08c9434baab3a63fd9b6cffeeac0347fbfa2534e7b27acab45c7c44bc558e072cf83a8051d66fe60815f502d71b2bc5f2cc6bba2202d993aaa4c2711c0de2b088ae332c512325429b01b4afec5e576ad105b67048ce00518eb7b20578887828bbf8e7bcc0061e92fe123820665c82f34f03e9677"], 0x1}, 0x1}, 0x0) 07:30:47 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0xc0ed0000, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:47 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff]}, 0x10) 07:30:47 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1f4]}, 0x6) 07:30:47 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x20000170, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1333.006097] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:47 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x49d, 0x101000) ioctl$sock_bt(r0, 0xfffffffffffffffd, &(0x7f00000001c0)="9e070000000000000000") sendmsg$nl_generic(r0, &(0x7f0000000140)={&(0x7f0000000180)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[]}, 0x1, 0x0, 0x0, 0x40041}, 0xfffffffffffffffc) 07:30:47 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a0000000000fffffff500000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) [ 1333.085798] ISOFS: Unable to identify CD-ROM format. 07:30:47 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="19414e544653202020205182f8076d368b2cb0c9625ca1f01e1308cdf807c3ad1119b66ba934fbaf617d53c629cd4a25462ec085165dc16b3e3792a7fc796eca0273b16b7081451731822a058184dc3f1262cb522db8c40ed534337e3746b6c91d5b0e7044e4af3596c29a5aab078c04463d4e5a6dd03fafa3232875ba90d49f90bdf430e98c0908a0e30d48efe0c58baade4b91d4124f25db0dff1e8e6c57aa14d93c91afa441cd8a9793e488383a97bbcb38e983843814200cca6c2cae99120fcba0ffb0016974457bc8d322cf92d5a653a33f77075e046c0aa5778e29789fff1d170eddc5002433b527ef2be8e85043015f89cdea881d9855b2047fdcef0e9d8c50e9fed623ecebd2e45ffd45425753b4bf8350b303ccec3701d86ff877d83b5570f1e9cf1f06bd6393070b6c09b09fc35b3b95eb3101d339be266ba2a3e8c05b5b0457aebc111fafea3e12b609732c0a64ad89bba1cd4bf36458cfa4f84f43f45a9f05ed89c01214bdd686683c2fd1187a29f3fa20b75cf2acf486154d967b6062d14ab847fb73e08e9984d058d1fddefeaf73c749b3eed06d9007180a0251cf2eddd2678d175828ba09c90884c4687cbb75e7f06f06ac2c8f5ebb502778444c24c80ca0e1415cf8a2cbe248d4fd712afb33bf4d44206089b2ce0fbf710b409fce14271f2085687e3b93ad84a2894a63d90bd63a7258918f0dbd225f58", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:47 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x215f0c00]}, 0x6) 07:30:47 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:47 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x7, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:47 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x361714a1a2f62bfa) open_by_handle_at(r0, &(0x7f0000000340)={0xc9, 0x4, "3e003b9da58fee79d7e3936e2b6f5a537eed01338bf8a9ff3be665debe44f5cd3087f73cc062a2f529e7337be8efaa02fa548aca638785a524f088aae601a128c1eb286638413f1278016424eba306f72f35d93eaa209e884f5dac2acb4ec97fe12dbdd1d4afee9eed01bc3ad0f5906cbbf2c86a6c6bfdcbd808739865c1127e214ae4ef58234970c6d97624643c07a57deb7c58fdd82c1408bbe3e93d2a97fe12a7cec614f7a75afff3acf84a81c8cd176c9021d58ac86fcd17744a1d3e025015"}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={r1, 0x3, 0x1, 0x2, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) [ 1333.200888] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1333.359370] ISOFS: Unable to identify CD-ROM format. 07:30:47 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000007a00000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:47 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80020500]}, 0x10) 07:30:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, "0000000000000000000000000000000000000000000000000000000000007fff", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:47 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:47 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x1400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:47 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x266c, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:47 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x115f0c0000000000]}, 0x6) 07:30:47 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x10000, 0x800) dup2(r0, r0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x400000, 0x0) ioctl$sock_bt(r2, 0x2000541b, &(0x7f0000000140)="bea000000000") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x725c, 0x200400) fgetxattr(r1, &(0x7f0000000040)=@random={'system.', '\x00'}, &(0x7f00000001c0)=""/152, 0x98) ioctl$KDSETLED(r3, 0x4b32, 0x81) [ 1333.457953] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:48 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:48 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f0000000200)={&(0x7f0000000240)={0x10, 0x34000, 0x0, 0x10000}, 0xfffffffffffffe51, &(0x7f0000000080)={&(0x7f0000000740)=ANY=[], 0x1}, 0x1, 0x0, 0x0, 0x4000000}, 0x4) 07:30:48 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, "0000000000000000000000000000000000000000000000000000000000000600", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:48 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000004800000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:48 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}, 0x6) 07:30:48 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1333.628012] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1333.656154] __ntfs_warning: 206 callbacks suppressed [ 1333.656163] ntfs: (device loop7): is_boot_sector_ntfs(): Invalid boot sector checksum. [ 1333.669456] ntfs: (device loop7): read_ntfs_boot_sector(): Primary boot sector is invalid. 07:30:48 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000]}, 0x10) 07:30:48 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, "0000000000000000000000000000000000000000000000000000000000000400", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) [ 1333.678110] ntfs: (device loop7): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 1333.690191] ntfs: (device loop7): ntfs_fill_super(): Not an NTFS volume. [ 1333.712954] ISOFS: Unable to identify CD-ROM format. [ 1333.781159] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1333.839629] ntfs: (device loop7): is_boot_sector_ntfs(): Invalid boot sector checksum. [ 1333.847740] ntfs: (device loop7): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 1333.856275] ntfs: (device loop7): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 1333.868445] ntfs: (device loop7): ntfs_fill_super(): Not an NTFS volume. 07:30:48 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x2000, 0x0) ioctl$sock_bt(r1, 0x0, &(0x7f0000000780)="d0e027b5a6a261af02bfed837bda43d98b224a75a1f7645cd7ed08e4dd20382e24136b91cefc883ccb7e928ffee8eaeaee55e26c62383f822f5e263916b3000100001312ab93947b7084c6c318a4868895d7c7bb7691f97496bcfb7727abaf8b481c06b698cbe312a30000000000000000000000010000004a1e714548d2a7ad99b518e54791732ac74c3b7a665182d01932810b53f64696327a52c39f7cc521a254a2464ce37354e52cbd8453d050d14eb3da76a436feda82cea537b30ffd7b6b1d000000000000000000002070a5f8cab93caf8dc25fd7e25abda836e5fcab33230b8e3c6e00e7a1d629281cd13270b959fe93e4aba7d72fe413f6bb558a633ccbdf17969bc34c994a4cfe88d84ced38d1b0151a8f5cbdba79f01ce458b25b523b363b6834dfdbedb32946f77130cb14124c6fff15c6f6e3581cf053c84537b657771073c471c68b34320d1264b6ee04d5e3cd33ae76f356aff192ba000000") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e21, 0x6, @loopback={0x0, 0x1}, 0x6}}, 0xd794, 0x1, 0x5, 0x7, 0x1}, &(0x7f0000000100)=0x98) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000140)={r2, 0x1}, 0x8) 07:30:48 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:48 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a000000000000000000fffffffe000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:48 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x2000000000000000, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:48 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x6) 07:30:48 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:48 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:48 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50280]}, 0x10) [ 1333.971098] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:48 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0xffff8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:48 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:48 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0xf8, 0x101000) ioctl$sock_bt(r1, 0x3, &(0x7f0000000100)="f754bea0c4d7") ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000140)) syz_open_pts(r1, 0x14006) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x8}, &(0x7f00000002c0)=0xffffffffffffffb8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0x4}, &(0x7f0000000280)=0x8) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000000)={0x0, 0x2710}, 0x9) 07:30:48 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a0000000000fffffffe00000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:48 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x105f0c00]}, 0x6) [ 1334.030738] ntfs: (device loop7): is_boot_sector_ntfs(): Invalid boot sector checksum. [ 1334.039033] ntfs: (device loop7): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 1334.061804] ISOFS: Unable to identify CD-ROM format. [ 1334.121865] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:48 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x10) 07:30:48 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="19414e544653202020205182f8076d368b2cb0c9625ca1f01e1308cdf807c3ad1119b66ba934fbaf617d53c629cd4a2d462ec085165dc16b3e3792a7fc796eca0273b16b7081451731822a058184dc3f1262cb522db8c40ed534337e3746b6c91d5b0e7044e4af3596c29a5aab078c04463d4e5a6dd03fafa3232875ba90d49f90bdf430e98c0908a0e30d48efe0c58baade4b91d4124f25db0dff1e8e6c57aa14d93c91afa441cd8a9793e488383a97bbcb38e983843814200cca6c2cae99120fcba0ffb0016974457bc8d322cf92d5a653a33f77075e046c0aa5778e29789fff1d170eddc5002433b527ef2be8e85043015f89cdea881d9855b2047fdcef0e9d8c50e9fed623ecebd2e45ffd45425753b4bf8350b303ccec3701d86ff877d83b5570f1e9cf1f06bd6393070b6c09b09fc35b3b95eb3101d339be266ba2a3e8c05b5b0457aebc111fafea3e12b609732c0a64ad89bba1cd4bf36458cfa4f84f43f45a9f05ed89c01214bdd686683c2fd1187a29f3fa20b75cf2acf486154d967b6062d14ab847fb73e08e9984d058d1fddefeaf73c749b3eed06d9007180a0251cf2eddd2678d175828ba09c90884c4687cbb75e7f06f06ac2c8f5ebb502778444c24c80ca0e1415cf8a2cbe248d4fd712afb33bf4d44206089b2ce0fbf710b409fce14271f2085687e3b93ad84a2894a63d90bd63a7258918f0dbd225f58", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:48 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x6800000000000000, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:48 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:48 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:48 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x6, 0x0) accept4$packet(r1, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x14, 0x80800) sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) 07:30:48 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x520000]}, 0x6) 07:30:48 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000000000200000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:48 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:48 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:48 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="1941b722a7a6d34535fd5182f8076d368b2cb0c9625ca1f01e1308cdf807c3ad1119b66ba934fbaf617d53c629cd4a70462ec085165dc16b3e3792a7fc796eca0273b16b7081451731822a058184dc3f1262cb522db8c40ed534337e3746b6c91d5b0e7044e4af3596c29a5aab078c04463d4e5a6dd03fafa3232875ba90d49f90bdf430e98c0908a0e30d48efe0c58baade4b91d4124f25db0dff1e8e6c57aa14d93c91afa441cd8a9793e488383a97bbcb38e983843814200cca6c2cae99120fcba0ffb0016974457bc8d322cf92d5a653a33f77075e046c0aa5778e29789fff1d170eddc5002433b527ef2be8e85043015f89cdea881d9855b2047fdcef0e9d8c50e9fed623ecebd2e45ffd45425753b4bf8350b303ccec3701d86ff877d83b5570f1e9cf1f06bd6393070b6c09b09fc35b3b95eb3101d339be266ba2a3e8c05b5b0457aebc111fafea3e12b609732c0a64ad89bba1cd4bf36458cfa4f84f43f45a9f05ed89c01214bdd686683c2fd1187a29f3fa20b75cf2acf486154d967b6062d14ab847fb73e08e9984d058d1fddefeaf73c749b3eed06d9007180a0251cf2eddd2678d175828ba09c90884c4687cbb75e7f06f06ac2c8f5ebb502778444c24c80ca0e1415cf8a2cbe248d4fd712afb33bf4d44206089b2ce0fbf710b409fce14271f2085687e3b93ad84a2894a63d90bd63a7258918f0dbd225f58", 0x1ff, 0x1}], 0x3f00000000000000, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:48 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff91]}, 0x10) [ 1334.328325] ISOFS: Unable to identify CD-ROM format. [ 1334.417018] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:48 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:48 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:48 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}, 0x6) 07:30:49 executing program 6: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x4000, 0x0) getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000180)=0x3f, &(0x7f00000001c0)=0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x800, 0x15a) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000080), 0x2) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(r1, 0x0, &(0x7f0000000100)="f754bea0c4d7") syz_open_dev$random(&(0x7f0000000000)='/dev/random\x00', 0x0, 0x4000) sendmsg$nl_generic(r2, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYRES64=r2], 0x1}, 0x1}, 0x0) ioctl$KIOCSOUND(r0, 0x4b2f, 0x2) accept4$unix(r1, 0x0, &(0x7f00000000c0), 0x80800) 07:30:49 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:49 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000002300000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) [ 1334.541427] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1334.586456] ISOFS: Unable to identify CD-ROM format. 07:30:49 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}, 0x10) 07:30:49 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:49 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x101000, 0x0) ioctl$sock_bt(r1, 0x0, &(0x7f0000000000)="f754bea0c4d7") sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="ceff00002e00fd060000000000000000030000000c00000008000900000000008d583a00000000000000000093ce1dca685d6fb63fc532596b9384bc23011fb25786a8b00a356c0007e89b488f3414601b531be41a584bdb38038d4948cde8d1abbd22da808e899d028851e7a0b13e1d48a4b0a3dfc04f028c5a8173b69651d4e99fc7958ba4575469919f721c74d3eae6e9b977c8b3f6e38e7a41aac49304affd4a311ea5552bb71e6d3cd0c15583e9590f688df46c558de8bc91d700433a58bc0990ba8d26b44f00c750bcf726cf894f1ff046f424bc2aa338a39b44e1437968c1acf5fb8d13f7bf0d303740c7b184e8eb58380d3245899e59cd551e1304f31d08c9434baab3a63fd9b6cffeeac0347fbfa2534e7b27acab45c7c44bc5"], 0x1}, 0x1}, 0x0) 07:30:49 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:49 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x8cffffff, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:49 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="19414e544653202020205182f8076d368b2cb0c9625ca1f01e1308cdf807c3ad1119b66ba934fbaf617d53c629cd4a6c462ec085165dc16b3e3792a7fc796eca0273b16b7081451731822a058184dc3f1262cb522db8c40ed534337e3746b6c91d5b0e7044e4af3596c29a5aab078c04463d4e5a6dd03fafa3232875ba90d49f90bdf430e98c0908a0e30d48efe0c58baade4b91d4124f25db0dff1e8e6c57aa14d93c91afa441cd8a9793e488383a97bbcb38e983843814200cca6c2cae99120fcba0ffb0016974457bc8d322cf92d5a653a33f77075e046c0aa5778e29789fff1d170eddc5002433b527ef2be8e85043015f89cdea881d9855b2047fdcef0e9d8c50e9fed623ecebd2e45ffd45425753b4bf8350b303ccec3701d86ff877d83b5570f1e9cf1f06bd6393070b6c09b09fc35b3b95eb3101d339be266ba2a3e8c05b5b0457aebc111fafea3e12b609732c0a64ad89bba1cd4bf36458cfa4f84f43f45a9f05ed89c01214bdd686683c2fd1187a29f3fa20b75cf2acf486154d967b6062d14ab847fb73e08e9984d058d1fddefeaf73c749b3eed06d9007180a0251cf2eddd2678d175828ba09c90884c4687cbb75e7f06f06ac2c8f5ebb502778444c24c80ca0e1415cf8a2cbe248d4fd712afb33bf4d44206089b2ce0fbf710b409fce14271f2085687e3b93ad84a2894a63d90bd63a7258918f0dbd225f58", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:49 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a0000000000fdfdffff00000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:49 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x6) 07:30:49 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, "0000000000000000000000000000000000000000000000000000000000000500", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) [ 1334.742845] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:49 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f0000000100)="f754bea0c4d7") r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x206001, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000040)={'raw\x00', 0x3, [{}, {}, {}]}, 0x58) seccomp(0x1, 0x0, &(0x7f0000000140)={0x3, &(0x7f00000000c0)=[{0x5, 0x1, 0x0, 0x2}, {0x7, 0x2, 0x1, 0x8}, {0x75c19409, 0xff, 0x7fff, 0x46}]}) sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="ceff00002e00fd060000000000000000030000000c00000008000900000000008d583a00000000000000000093ce1dca685d6fb63fc532596b9384bc23011fb25786a8b00a356c0007e89b488f3414601b531be41a584bdb38038d4948cde8d1abbd22da808e899d028851e7a0b13e1d48a4b0a3dfc04f028c5a8173b69651d4e99fc7958ba4575469919f721c74d3eae6e9b977c8b3f6e38e7a41aac49304affd4a311ea5552bb71e6d3cd0c15583e9590f688df46c558de8bc91d700433a58bc0990ba8d26b44f00c750bcf726cf894f1ff046f424bc2aa338a39b44e1437968c1acf5fb8d13f7bf0d303740c7b184e8eb58380d3245899e59cd551e1304f31d08c9434baab3a63fd9b6cffeeac0347fbfa2534e7b27acab45c7c44bc5"], 0x1}, 0x1}, 0x0) 07:30:49 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x79]}, 0x10) [ 1334.834433] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:49 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:49 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000040000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:49 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="19414e544653202020205182f8076d368b2cb0c9625ca1f01e1308cdf807c3ad1119b66ba934fbaf617d53c629cd4a6f462ec085165dc16b3e3792a7fc796eca0273b16b7081451731822a058184dc3f1262cb522db8c40ed534337e3746b6c91d5b0e7044e4af3596c29a5aab078c04463d4e5a6dd03fafa3232875ba90d49f90bdf430e98c0908a0e30d48efe0c58baade4b91d4124f25db0dff1e8e6c57aa14d93c91afa441cd8a9793e488383a97bbcb38e983843814200cca6c2cae99120fcba0ffb0016974457bc8d322cf92d5a653a33f77075e046c0aa5778e29789fff1d170eddc5002433b527ef2be8e85043015f89cdea881d9855b2047fdcef0e9d8c50e9fed623ecebd2e45ffd45425753b4bf8350b303ccec3701d86ff877d83b5570f1e9cf1f06bd6393070b6c09b09fc35b3b95eb3101d339be266ba2a3e8c05b5b0457aebc111fafea3e12b609732c0a64ad89bba1cd4bf36458cfa4f84f43f45a9f05ed89c01214bdd686683c2fd1187a29f3fa20b75cf2acf486154d967b6062d14ab847fb73e08e9984d058d1fddefeaf73c749b3eed06d9007180a0251cf2eddd2678d175828ba09c90884c4687cbb75e7f06f06ac2c8f5ebb502778444c24c80ca0e1415cf8a2cbe248d4fd712afb33bf4d44206089b2ce0fbf710b409fce14271f2085687e3b93ad84a2894a63d90bd63a7258918f0dbd225f58", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:49 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}, 0x6) 07:30:49 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) [ 1334.948080] ISOFS: Unable to identify CD-ROM format. [ 1335.089711] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:49 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:49 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x7400, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:49 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:49 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:49 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff91]}, 0x10) 07:30:49 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1100]}, 0x6) 07:30:49 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a0000000000f5ffffff00000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:49 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a09b13c]}, 0x10) [ 1335.243687] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:49 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) [ 1335.288027] ISOFS: Unable to identify CD-ROM format. 07:30:49 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x80ffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:49 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, "0000000000000000000000000000000000000000000000000000000000000003", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:49 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a0000000000000000000000001f000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:49 executing program 6: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x266c, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:49 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2d5f0c0000000000]}, 0x6) 07:30:49 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x30c5b, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:49 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8030095400000000]}, 0x10) [ 1335.418615] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:49 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:49 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) [ 1335.538115] ISOFS: Unable to identify CD-ROM format. [ 1335.613576] ISOFS: Unable to identify CD-ROM format. 07:30:50 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:50 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, 0x6) 07:30:50 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000000040000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:50 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000461fa8)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(seed))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00004f7000)="649c47ad46390dc86dae79fa409d4d54", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg(r1, &(0x7f00000002c0)={&(0x7f0000000000)=@ethernet={0x0, @link_local={0x1, 0x80, 0xc2}}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000140)="b531f5204f6b7bff016ff4491e20813a", 0x10}], 0x1, &(0x7f0000000200)}, 0x0) io_setup(0x800000100000005, &(0x7f0000f69000)=0x0) io_submit(r2, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000007d000)="b3", 0x1}]) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x4080, 0x0) ioctl$KVM_GET_REG_LIST(r3, 0xc008aeb0, &(0x7f00000000c0)={0x1, [0x7]}) 07:30:50 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:50 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x7000000, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:50 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc803]}, 0x10) 07:30:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) [ 1335.731010] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:50 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, "0000000000000000000000000000000000000000000000000000000000000006", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:50 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a0000000000ffffffffffffff7f000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:50 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) [ 1335.852880] ISOFS: Unable to identify CD-ROM format. 07:30:50 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x215f0c0000000000]}, 0x6) [ 1335.895787] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:50 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x80ffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, "0000000000000000000000000000000000000000000000000000000000000300", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:50 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0xfbffffff, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:50 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000000000000000009000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:50 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:50 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x10) 07:30:50 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff00000000]}, 0x6) 07:30:50 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={"74756e6c3000f00600e100000400", &(0x7f0000000280)=ANY=[@ANYBLOB="010000000000e9ffffffffff08ebff574900000000000000000000000000000000829eb43d795f82547d243b7873a2da3ec6a670010448bff214f7a3d7f67e89a60f1e69ee90b4cb9109af4ef7f4dddf1ec07fb07e91351d7401bd827c503fdb45bff824bfd0c25553a5d5096d917fec2dc10df76c257aae24693db350a8acef7277b342ac2363ea2cd970f3f9fdaea908f1490b59"]}) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x20000, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x5, @dev={0xfe, 0x80, [], 0x12}, 0x8}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x4e23, 0x5, @remote={0xfe, 0x80, [], 0xbb}, 0x1ff}}, 0x1, 0x1, 0x9bc, "133b28c8f233984420bf967d74859618f563082e5bccec68bb2e6289a8eb79c2d1bee4ff725d63c96672f087b22e6c1f43a31ac106ef8d4f7e58beeda5a19a70d90051067c9979c803338cc004b35f86"}, 0xd8) ioctl$SG_GET_REQUEST_TABLE(r1, 0x2286, &(0x7f0000000340)) [ 1336.106063] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:50 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:50 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000000000000000007000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:50 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={"74756e6c3000f00600e100000400", &(0x7f0000000280)=ANY=[@ANYBLOB="010000000000e9ffffffffff08ebff574900000000000000000000000000000000829eb43d795f82547d243b7873a2da3ec6a670010448bff214f7a3d7f67e89a60f1e69ee90b4cb9109af4ef7f4dddf1ec07fb07e91351d7401bd827c503fdb45bff824bfd0c25553a5d5096d917fec2dc10df76c257aae24693db350a8acef7277b342ac2363ea2cd970f3f9fdaea908f1490b59"]}) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x20000, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x5, @dev={0xfe, 0x80, [], 0x12}, 0x8}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x4e23, 0x5, @remote={0xfe, 0x80, [], 0xbb}, 0x1ff}}, 0x1, 0x1, 0x9bc, "133b28c8f233984420bf967d74859618f563082e5bccec68bb2e6289a8eb79c2d1bee4ff725d63c96672f087b22e6c1f43a31ac106ef8d4f7e58beeda5a19a70d90051067c9979c803338cc004b35f86"}, 0xd8) ioctl$SG_GET_REQUEST_TABLE(r1, 0x2286, &(0x7f0000000340)) 07:30:50 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc900000000000000]}, 0x10) [ 1336.242047] ISOFS: Unable to identify CD-ROM format. 07:30:50 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:50 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}, 0x6) [ 1336.268545] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:50 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a0000000000fffffdfc00000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:50 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x5b0c0300, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) [ 1336.462766] ISOFS: Unable to identify CD-ROM format. 07:30:50 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r0 = socket(0x11, 0x80002, 0x0) setsockopt(r0, 0x107, 0xd, &(0x7f0000001000), 0xc5) 07:30:50 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x14000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:50 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="19414e544653202020205182f8076d368b2cb0c9625ca1f01e1308cdf807c3ad1119b66ba934fbaf617d53c629cd4a70462ec085165dc16b3e3792a7fc796eca2573b16b7081451731822a058184dc3f1262cb522db8c40ed534337e3746b6c91d5b0e7044e4af3596c29a5aab078c04463d4e5a6dd03fafa3232875ba90d49f90bdf430e98c0908a0e30d48efe0c58baade4b91d4124f25db0dff1e8e6c57aa14d93c91afa441cd8a9793e488383a97bbcb38e983843814200cca6c2cae99120fcba0ffb0016974457bc8d322cf92d5a653a33f77075e046c0aa5778e29789fff1d170eddc5002433b527ef2be8e85043015f89cdea881d9855b2047fdcef0e9d8c50e9fed623ecebd2e45ffd45425753b4bf8350b303ccec3701d86ff877d83b5570f1e9cf1f06bd6393070b6c09b09fc35b3b95eb3101d339be266ba2a3e8c05b5b0457aebc111fafea3e12b609732c0a64ad89bba1cd4bf36458cfa4f84f43f45a9f05ed89c01214bdd686683c2fd1187a29f3fa20b75cf2acf486154d967b6062d14ab847fb73e08e9984d058d1fddefeaf73c749b3eed06d9007180a0251cf2eddd2678d175828ba09c90884c4687cbb75e7f06f06ac2c8f5ebb502778444c24c80ca0e1415cf8a2cbe248d4fd712afb33bf4d44206089b2ce0fbf710b409fce14271f2085687e3b93ad84a2894a63d90bd63a7258918f0dbd225f58", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:50 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x40020000]}, 0x6) 07:30:50 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x142800]}, 0x10) 07:30:50 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="1941b722a7a6d34535fd5182f8076d368b2cb0c9625ca1f01e1308cdf807c3ad1119b66ba934fbaf617d53c629cd4a70462ec085165dc16b3e3792a7fc796eca0273b16b7081451731822a058184dc3f1262cb522db8c40ed534337e3746b6c91d5b0e7044e4af3596c29a5aab078c04463d4e5a6dd03fafa3232875ba90d49f90bdf430e98c0908a0e30d48efe0c58baade4b91d4124f25db0dff1e8e6c57aa14d93c91afa441cd8a9793e488383a97bbcb38e983843814200cca6c2cae99120fcba0ffb0016974457bc8d322cf92d5a653a33f77075e046c0aa5778e29789fff1d170eddc5002433b527ef2be8e85043015f89cdea881d9855b2047fdcef0e9d8c50e9fed623ecebd2e45ffd45425753b4bf8350b303ccec3701d86ff877d83b5570f1e9cf1f06bd6393070b6c09b09fc35b3b95eb3101d339be266ba2a3e8c05b5b0457aebc111fafea3e12b609732c0a64ad89bba1cd4bf36458cfa4f84f43f45a9f05ed89c01214bdd686683c2fd1187a29f3fa20b75cf2acf486154d967b6062d14ab847fb73e08e9984d058d1fddefeaf73c749b3eed06d9007180a0251cf2eddd2678d175828ba09c90884c4687cbb75e7f06f06ac2c8f5ebb502778444c24c80ca0e1415cf8a2cbe248d4fd712afb33bf4d44206089b2ce0fbf710b409fce14271f2085687e3b93ad84a2894a63d90bd63a7258918f0dbd225f58", 0x1ff, 0x1}], 0x650c0300, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:50 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000000400000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) [ 1336.525143] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:51 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:51 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:51 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:51 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000180)=0x3, 0x4) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x88) setsockopt$inet_int(r1, 0x0, 0x6, &(0x7f0000000140), 0x4) 07:30:51 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a0000000000ffffff8c00000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:51 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xc5f0d]}, 0x6) 07:30:51 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:51 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32d0600]}, 0x10) [ 1336.707334] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1336.717503] ISOFS: Unable to identify CD-ROM format. 07:30:51 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2100000000000002, 0x0) r2 = socket(0xa, 0x1, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000000)=[{0x4, 0x9}, {0xa, 0x7}], 0x2) ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f00000000c0)={'team_slave_1\x00', 0x1}) bind$netlink(r3, &(0x7f00000008c0)={0x10, 0x0, 0x0, 0x1}, 0xc) connect$inet6(r0, &(0x7f0000000640)={0xa, 0x4e21, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x401}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote={0xfe, 0x80, [], 0xbb}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast2={0xff, 0x2, [], 0x1}, 0x4, 0x6c}, 0x0, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x90, 0x0, 0x0, 0x40}}, 0xe8) sendto$inet6(r0, &(0x7f0000000500)="24e65c0884b6a74b1b6fb5d08c65590f45679dc775f51339516a70e844d19db1671e160be5a69888ba240c89cc9d3106ef4a3edaab7a12da5f6cdcc1f739d14209617d89d9a84eb49102d58d2971d139383b48217ff11d8b7d9a8f2cce796063dd88", 0x62, 0x4000, &(0x7f0000000840)={0xa, 0x4e20, 0x6, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x14}}, 0x4}, 0x1c) sendmsg(r1, &(0x7f0000001700)={0x0, 0x0, &(0x7f0000001680)}, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000400)=@assoc_value={0x0, 0x1}, &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000007c0)={r5, 0x9}, 0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x4}, &(0x7f00000003c0)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000680)=ANY=[@ANYRES32=r6, @ANYBLOB="6d727358e65665681da4424945000900030007003bd8e1a1c2e286f8f084ccc806cf7738f46fb162d49ebb7aa126114877a9689c000400000000000000422349ebd22bec8b9f3e2372a47b2fec3ef0133d53249a53d208ef16e2039509d139c1e3fd99d24b0a8b3ecda9babf010cc9f0c616da7fd0ef6541fac01a0c62bc9e3f4e04b9e5afb3cb079639d16763fb11ca7a637e6808c62fc76718c4d1"], 0x2) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000880)={r5, 0x100000001}, 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000900)={{{@in6=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000000140)=0xe8) connect$packet(r2, &(0x7f0000000600)={0x11, 0x1, r7, 0x1, 0x100, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x4e22, @loopback=0x7f000001}}, 0x1, 0x2, 0x3, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r4, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000740)={{0x0, @broadcast=0xffffffff, 0x0, 0x0, 'none\x00'}, {@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x2}}, 0x44) sendto$inet(r4, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000580), &(0x7f0000000480)=0x8) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) unshare(0x2000000) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 07:30:51 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:51 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="1941b722a7a6d34535fd5182f8076d368b2cb0c9625ca1f01e1308cdf807c3ad1119b66ba934fbaf617d53c629cd4a70462ec085165dc16b3e3792a7fc796eca0273b16b7081451731822a058184dc3f1262cb522db8c40ed534337e3746b6c91d5b0e7044e4af3596c29a5aab078c04463d4e5a6dd03fafa3232875ba90d49f90bdf430e98c0908a0e30d48efe0c58baade4b91d4124f25db0dff1e8e6c57aa14d93c91afa441cd8a9793e488383a97bbcb38e983843814200cca6c2cae99120fcba0ffb0016974457bc8d322cf92d5a653a33f77075e046c0aa5778e29789fff1d170eddc5002433b527ef2be8e85043015f89cdea881d9855b2047fdcef0e9d8c50e9fed623ecebd2e45ffd45425753b4bf8350b303ccec3701d86ff877d83b5570f1e9cf1f06bd6393070b6c09b09fc35b3b95eb3101d339be266ba2a3e8c05b5b0457aebc111fafea3e12b609732c0a64ad89bba1cd4bf36458cfa4f84f43f45a9f05ed89c01214bdd686683c2fd1187a29f3fa20b75cf2acf486154d967b6062d14ab847fb73e08e9984d058d1fddefeaf73c749b3eed06d9007180a0251cf2eddd2678d175828ba09c90884c4687cbb75e7f06f06ac2c8f5ebb502778444c24c80ca0e1415cf8a2cbe248d4fd712afb33bf4d44206089b2ce0fbf710b409fce14271f2085687e3b93ad84a2894a63d90bd63a7258918f0dbd225f58", 0x1ff, 0x1}], 0x48, &(0x7f0000002ac0)) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) [ 1336.867385] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1336.981536] ISOFS: Unable to identify CD-ROM format. 07:30:52 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="19414e544653202020205182f8076d368b2cb0c9625ca1f01e1308cdf807c3ad1119b66ba934fbaf617d53c629cd4a70462ec085165dc16b3e3792a7fc796eca1073b16b7081451731822a058184dc3f1262cb522db8c40ed534337e3746b6c91d5b0e7044e4af3596c29a5aab078c04463d4e5a6dd03fafa3232875ba90d49f90bdf430e98c0908a0e30d48efe0c58baade4b91d4124f25db0dff1e8e6c57aa14d93c91afa441cd8a9793e488383a97bbcb38e983843814200cca6c2cae99120fcba0ffb0016974457bc8d322cf92d5a653a33f77075e046c0aa5778e29789fff1d170eddc5002433b527ef2be8e85043015f89cdea881d9855b2047fdcef0e9d8c50e9fed623ecebd2e45ffd45425753b4bf8350b303ccec3701d86ff877d83b5570f1e9cf1f06bd6393070b6c09b09fc35b3b95eb3101d339be266ba2a3e8c05b5b0457aebc111fafea3e12b609732c0a64ad89bba1cd4bf36458cfa4f84f43f45a9f05ed89c01214bdd686683c2fd1187a29f3fa20b75cf2acf486154d967b6062d14ab847fb73e08e9984d058d1fddefeaf73c749b3eed06d9007180a0251cf2eddd2678d175828ba09c90884c4687cbb75e7f06f06ac2c8f5ebb502778444c24c80ca0e1415cf8a2cbe248d4fd712afb33bf4d44206089b2ce0fbf710b409fce14271f2085687e3b93ad84a2894a63d90bd63a7258918f0dbd225f58", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:52 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000000000000000fff000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:52 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:52 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:52 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xc5f1d]}, 0x6) 07:30:52 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8030000]}, 0x10) 07:30:52 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)={[], 0xfeffffff00000000}) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:52 executing program 6: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000040)="295ee1311f16f477671070") mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000840000/0x2000)=nil, 0x2000, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f0000000100)=0xfffffffffffffffc, 0x5, 0x0) mbind(&(0x7f0000126000/0x3000)=nil, 0x3321a8df32ee8487, 0x0, &(0x7f000016e000), 0x5, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) mincore(&(0x7f00007c1000/0x1000)=nil, 0x1000, &(0x7f00000002c0)=""/176) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x280000, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000180)={0x0, 0x100000000, 0x10, 0x0, 0x5}, &(0x7f00000001c0)=0x18) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000200)={0x7, 0x3f, 0x820a, 0xffff, 0x7, 0x100, 0x4, 0xee02, r4}, 0x20) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x5d, &(0x7f0000000580), 0x0) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000000e9ff00020000000000000002000000400000000300000000000000634bd703ce24acddcb054d0000000000000000000000000000000000000000120000000000000000"]) ioctl$KVM_RUN(r5, 0xae80, 0x0) munlockall() setxattr(&(0x7f0000000000)='\x00', &(0x7f0000000080)=@known='security.capability\x00', &(0x7f00000000c0)='self\x00', 0x5, 0x8aced29ffaf6330c) [ 1337.868199] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1337.956117] ISOFS: Unable to identify CD-ROM format. 07:30:52 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:52 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:52 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a0000000000fffffff400000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:52 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xe803]}, 0x6) 07:30:52 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x1400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:52 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x10) 07:30:52 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)={[], 0x1000000000}) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:52 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="19414e544653202020205182f8076d368b2cb0c9625ca1f01e1308cdf807c3ad1119b66ba934fbaf617d53c629cd4a70462ec085165dc16b3e3792a7fc796eca1473b16b7081451731822a058184dc3f1262cb522db8c40ed534337e3746b6c91d5b0e7044e4af3596c29a5aab078c04463d4e5a6dd03fafa3232875ba90d49f90bdf430e98c0908a0e30d48efe0c58baade4b91d4124f25db0dff1e8e6c57aa14d93c91afa441cd8a9793e488383a97bbcb38e983843814200cca6c2cae99120fcba0ffb0016974457bc8d322cf92d5a653a33f77075e046c0aa5778e29789fff1d170eddc5002433b527ef2be8e85043015f89cdea881d9855b2047fdcef0e9d8c50e9fed623ecebd2e45ffd45425753b4bf8350b303ccec3701d86ff877d83b5570f1e9cf1f06bd6393070b6c09b09fc35b3b95eb3101d339be266ba2a3e8c05b5b0457aebc111fafea3e12b609732c0a64ad89bba1cd4bf36458cfa4f84f43f45a9f05ed89c01214bdd686683c2fd1187a29f3fa20b75cf2acf486154d967b6062d14ab847fb73e08e9984d058d1fddefeaf73c749b3eed06d9007180a0251cf2eddd2678d175828ba09c90884c4687cbb75e7f06f06ac2c8f5ebb502778444c24c80ca0e1415cf8a2cbe248d4fd712afb33bf4d44206089b2ce0fbf710b409fce14271f2085687e3b93ad84a2894a63d90bd63a7258918f0dbd225f58", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) [ 1338.077457] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:52 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:52 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a000000000000000000fffffff6000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:52 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1d5f0c0000000000]}, 0x6) 07:30:52 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) [ 1338.254161] ISOFS: Unable to identify CD-ROM format. [ 1338.303527] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:52 executing program 6: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x9, &(0x7f0000000480)={0x0, 0x90, "4a34c260b9f5528fbb1b66353800666fea12a29f9b4471caf49071925de387975a6945ecd60365a02ae4073e037bf4a56a376cb8665aad049851c3bcb15b30560bc80771831da91b97cc7f1b26652c0b061fa4fb4aa6bb7f61a78f727bb9a9ba7205945a71b6a665ca2f0f9ed3861c83b4435a8910e8f15cf83137cf19047a2739d60f9de014f86046b62055fcc327e4"}, &(0x7f0000000000)=0x98) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x400000, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000180)={r1, 0xa8, "fc6aed6fcd68205624f1d18a5ef14219fec4c3e285d71c9cef1e09eec12678f0b2d33c935e0496d9d213191b6b8ee38132ade8657abbb5a26920271fb063f78bb309e025e4dcea20effefdaacd00aca9bfd652ec1144d6acc9c5900165da4d2791177b5a4fdeb44c63e278afcede0acdd417a965ad680ecd6461a363f57735ba3117a3fcd4c664059011e12bebfa8a5a27b70b8ac18758e29dc6c5fced9dcd95a62f4d000d677bc7"}, &(0x7f0000000240)=0xb0) creat(&(0x7f0000000040)='./file0\x00', 0x120) 07:30:52 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:52 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00]}, 0x10) 07:30:52 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:52 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a0000000000000000000000004c000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:52 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)={[], 0x9a000000}) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:52 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:52 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x185f0c00]}, 0x6) 07:30:52 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x8102, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="100000000000000000000000070000001000000000000000000000008a2f0d1b"], 0x20}, 0x0) [ 1338.482749] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:52 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:52 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000000000010000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) [ 1338.524134] ISOFS: Unable to identify CD-ROM format. 07:30:53 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:53 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x6) 07:30:53 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:53 executing program 6: socketpair$inet(0x2, 0xa, 0x80000000, &(0x7f00000000c0)={0xffffffffffffffff}) getsockopt$inet_mreq(r0, 0x0, 0x1f, &(0x7f0000000100)={@multicast2, @dev}, &(0x7f0000000140)=0x8) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0xfffffffffffffffe) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000000)="025cc83d6d345f8f760070") unshare(0x2000400) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000080)=0x100, 0x4) ioctl$int_out(r1, 0x80004522, &(0x7f0000000000)) 07:30:53 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)={[], 0x2300}) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5ae39ad4]}, 0x10) 07:30:53 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:53 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a0000000000000000000000006c000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) [ 1338.685940] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1338.714121] __ntfs_warning: 198 callbacks suppressed [ 1338.714133] ntfs: (device loop2): is_boot_sector_ntfs(): Invalid boot sector checksum. [ 1338.727411] ntfs: (device loop2): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 1338.729809] ntfs: (device loop7): is_boot_sector_ntfs(): Invalid boot sector checksum. [ 1338.735832] ntfs: (device loop2): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 1338.735841] ntfs: (device loop2): ntfs_fill_super(): Not an NTFS volume. [ 1338.763082] ntfs: (device loop7): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 1338.771501] ntfs: (device loop7): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 07:30:53 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:53 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a0000000000fffffffb00000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) [ 1338.783572] ntfs: (device loop7): ntfs_fill_super(): Not an NTFS volume. 07:30:53 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, "0000000000000000000000000000000000000000000000000000000000000005", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:53 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}, 0x6) 07:30:53 executing program 6: r0 = memfd_create(&(0x7f00000000c0)='#em1#+\x00', 0x1) write(r0, &(0x7f0000001040)="24ac068c1e6251fdb7ddcde0d6421454a8bc61d0f8a2f1ee3ff7ccb6611a475f1049dfd714794cc6b5fc2f57a902f786e77b3e8a809ab524c32cf836e7e954133ae5bf5dcab13d00df3110", 0x4b) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) setitimer(0x0, &(0x7f0000000040)={{}, {0x77359400}}, &(0x7f0000000140)) [ 1338.849440] ntfs: (device loop7): is_boot_sector_ntfs(): Invalid boot sector checksum. [ 1338.857593] ntfs: (device loop7): read_ntfs_boot_sector(): Primary boot sector is invalid. 07:30:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}, 0x10) [ 1338.891021] ISOFS: Unable to identify CD-ROM format. 07:30:53 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000600000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) [ 1338.921114] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:53 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:53 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="19414e544653202020205182f8076d368b2cb0c9625ca1f01e1308cdf807c3ad1119b66ba934fbaf617d53c629cd4a70462ec085165dc16b3e3792a7fc796eca0275b16b7081451731822a058184dc3f1262cb522db8c40ed534337e3746b6c91d5b0e7044e4af3596c29a5aab078c04463d4e5a6dd03fafa3232875ba90d49f90bdf430e98c0908a0e30d48efe0c58baade4b91d4124f25db0dff1e8e6c57aa14d93c91afa441cd8a9793e488383a97bbcb38e983843814200cca6c2cae99120fcba0ffb0016974457bc8d322cf92d5a653a33f77075e046c0aa5778e29789fff1d170eddc5002433b527ef2be8e85043015f89cdea881d9855b2047fdcef0e9d8c50e9fed623ecebd2e45ffd45425753b4bf8350b303ccec3701d86ff877d83b5570f1e9cf1f06bd6393070b6c09b09fc35b3b95eb3101d339be266ba2a3e8c05b5b0457aebc111fafea3e12b609732c0a64ad89bba1cd4bf36458cfa4f84f43f45a9f05ed89c01214bdd686683c2fd1187a29f3fa20b75cf2acf486154d967b6062d14ab847fb73e08e9984d058d1fddefeaf73c749b3eed06d9007180a0251cf2eddd2678d175828ba09c90884c4687cbb75e7f06f06ac2c8f5ebb502778444c24c80ca0e1415cf8a2cbe248d4fd712afb33bf4d44206089b2ce0fbf710b409fce14271f2085687e3b93ad84a2894a63d90bd63a7258918f0dbd225f58", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:53 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80]}, 0x6) 07:30:53 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)={[], 0x9000000}) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:53 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, "000000000000000000000000000000000000000000000000000000000000007f", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:53 executing program 6: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0xc0046d00, &(0x7f0000000000)={0x2, 0x400, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x7}) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000140), &(0x7f0000000100)=0x4da) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000040)={0x9, 0x7ff, 0x5, 0x2, 0x401, 0xffffffffffffff01, 0x9, 0x7, 0x1, 0x400, 0x80000001, 0x9}) 07:30:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1800000000000000]}, 0x10) 07:30:53 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000000000000000080000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:53 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x80ffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1339.110288] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:53 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:53 executing program 6: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x100000000000000, 0x482, &(0x7f00000000c0)=""/128, &(0x7f0000000140)=0x80) 07:30:53 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) [ 1339.199869] ISOFS: Unable to identify CD-ROM format. 07:30:53 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000007400000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:53 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x6) 07:30:53 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x14000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1339.281655] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1339.293361] IPVS: length: 128 != 8 07:30:53 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)={[], 0xfffffff5}) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1802000000000000]}, 0x10) [ 1339.464265] ISOFS: Unable to identify CD-ROM format. 07:30:54 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:54 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x410100, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) r2 = semget$private(0x0, 0x3, 0x0) semctl$GETPID(r2, 0x3, 0xb, &(0x7f0000000200)=""/36) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={@mcast2={0xff, 0x2, [], 0x1}, 0x6, r1}) getsockopt$inet6_udp_int(r0, 0x11, 0x80, &(0x7f00000000c0), &(0x7f0000000140)=0x4) ioctl$sock_netdev_private(r0, 0x89f2, &(0x7f0000000100)="fcaac949dab1d172a40e3b3cee087337dbe7b9") setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0x7ff, 0x8) getsockopt$ax25_buf(r0, 0x101, 0x19, &(0x7f0000000340)=""/158, &(0x7f0000000400)=0xffffffffffffffe8) socket$vsock_stream(0x28, 0x1, 0x0) 07:30:54 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, "0000000000000000000000000000000000000000000000000000000000000003", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:54 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:54 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000006e09000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:54 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}, 0x6) 07:30:54 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)={[], 0x4aa}) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:54 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5455010000000000]}, 0x10) [ 1339.618028] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:54 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:54 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:54 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000008cffffff00000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:54 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:54 executing program 6: r0 = socket$inet6(0xa, 0x100000001, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x5d, &(0x7f0000000580), 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000040)=[@text16={0x10, &(0x7f0000000000)="f0194699670f01cbf2f031300f20d86635200000000f22d866660f2e3c36f3aa0f08ba610066ed0f8159e3f20f1b2b", 0x2f}], 0x1, 0x50, &(0x7f0000000140), 0x0) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f00000000c0)=ANY=[@ANYRES16=r1]) ioctl$KVM_RUN(r3, 0xae80, 0x0) 07:30:54 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1f5f0c0000000000]}, 0x6) 07:30:54 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000]}, 0x10) [ 1339.798122] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1339.807372] ISOFS: Unable to identify CD-ROM format. 07:30:54 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="19414e544653202020205182f8076d368b2cb0c9625ca1f01e1308cdf807c3ad1119b66ba934fbaf617d53c629cd4a70462ec085165dc16b3e3792a7fc796eca0223b16b7081451731822a058184dc3f1262cb522db8c40ed534337e3746b6c91d5b0e7044e4af3596c29a5aab078c04463d4e5a6dd03fafa3232875ba90d49f90bdf430e98c0908a0e30d48efe0c58baade4b91d4124f25db0dff1e8e6c57aa14d93c91afa441cd8a9793e488383a97bbcb38e983843814200cca6c2cae99120fcba0ffb0016974457bc8d322cf92d5a653a33f77075e046c0aa5778e29789fff1d170eddc5002433b527ef2be8e85043015f89cdea881d9855b2047fdcef0e9d8c50e9fed623ecebd2e45ffd45425753b4bf8350b303ccec3701d86ff877d83b5570f1e9cf1f06bd6393070b6c09b09fc35b3b95eb3101d339be266ba2a3e8c05b5b0457aebc111fafea3e12b609732c0a64ad89bba1cd4bf36458cfa4f84f43f45a9f05ed89c01214bdd686683c2fd1187a29f3fa20b75cf2acf486154d967b6062d14ab847fb73e08e9984d058d1fddefeaf73c749b3eed06d9007180a0251cf2eddd2678d175828ba09c90884c4687cbb75e7f06f06ac2c8f5ebb502778444c24c80ca0e1415cf8a2cbe248d4fd712afb33bf4d44206089b2ce0fbf710b409fce14271f2085687e3b93ad84a2894a63d90bd63a7258918f0dbd225f58", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:54 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x1400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:54 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)={[], 0x640c030000000000}) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:54 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a0000000000fbffffff00000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:54 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:54 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="19414e544653202020205182f8076d368b2cb0c9625ca1f01e1308cdf807c3ad1119b66ba934fbaf617d53c629cd4a70462ec085165dc16b3e3792a7fc796eca0263b16b7081451731822a058184dc3f1262cb522db8c40ed534337e3746b6c91d5b0e7044e4af3596c29a5aab078c04463d4e5a6dd03fafa3232875ba90d49f90bdf430e98c0908a0e30d48efe0c58baade4b91d4124f25db0dff1e8e6c57aa14d93c91afa441cd8a9793e488383a97bbcb38e983843814200cca6c2cae99120fcba0ffb0016974457bc8d322cf92d5a653a33f77075e046c0aa5778e29789fff1d170eddc5002433b527ef2be8e85043015f89cdea881d9855b2047fdcef0e9d8c50e9fed623ecebd2e45ffd45425753b4bf8350b303ccec3701d86ff877d83b5570f1e9cf1f06bd6393070b6c09b09fc35b3b95eb3101d339be266ba2a3e8c05b5b0457aebc111fafea3e12b609732c0a64ad89bba1cd4bf36458cfa4f84f43f45a9f05ed89c01214bdd686683c2fd1187a29f3fa20b75cf2acf486154d967b6062d14ab847fb73e08e9984d058d1fddefeaf73c749b3eed06d9007180a0251cf2eddd2678d175828ba09c90884c4687cbb75e7f06f06ac2c8f5ebb502778444c24c80ca0e1415cf8a2cbe248d4fd712afb33bf4d44206089b2ce0fbf710b409fce14271f2085687e3b93ad84a2894a63d90bd63a7258918f0dbd225f58", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:54 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x275f0c0000000000]}, 0x6) 07:30:54 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha384\x00'}, 0x58) r2 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xffffffff7fffffff, 0x46832df9976f9ee4) ioctl$TUNGETIFF(r2, 0x800454d2, &(0x7f00000000c0)) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r3 = accept$alg(r1, 0x0, 0x0) recvmmsg(r3, &(0x7f0000000900)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 07:30:54 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f]}, 0x10) [ 1340.069045] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:54 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="19414e544653202020205182f8076d368b2cb0c9625ca1f01e1308cdf807c3ad1119b66ba934fbaf617d53c629cd4a70462ec085165dc16b3e3792a7fc796eca0270b16b7081451731822a058184dc3f1262cb522db8c40ed534337e3746b6c91d5b0e7044e4af3596c29a5aab078c04463d4e5a6dd03fafa3232875ba90d49f90bdf430e98c0908a0e30d48efe0c58baade4b91d4124f25db0dff1e8e6c57aa14d93c91afa441cd8a9793e488383a97bbcb38e983843814200cca6c2cae99120fcba0ffb0016974457bc8d322cf92d5a653a33f77075e046c0aa5778e29789fff1d170eddc5002433b527ef2be8e85043015f89cdea881d9855b2047fdcef0e9d8c50e9fed623ecebd2e45ffd45425753b4bf8350b303ccec3701d86ff877d83b5570f1e9cf1f06bd6393070b6c09b09fc35b3b95eb3101d339be266ba2a3e8c05b5b0457aebc111fafea3e12b609732c0a64ad89bba1cd4bf36458cfa4f84f43f45a9f05ed89c01214bdd686683c2fd1187a29f3fa20b75cf2acf486154d967b6062d14ab847fb73e08e9984d058d1fddefeaf73c749b3eed06d9007180a0251cf2eddd2678d175828ba09c90884c4687cbb75e7f06f06ac2c8f5ebb502778444c24c80ca0e1415cf8a2cbe248d4fd712afb33bf4d44206089b2ce0fbf710b409fce14271f2085687e3b93ad84a2894a63d90bd63a7258918f0dbd225f58", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:54 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:54 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000000000500000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:54 executing program 6: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000c00)='./file0\x00', &(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)='devtmpfs\x00', 0x0, &(0x7f0000000cc0)) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) mkdir(&(0x7f00000002c0)='./file0/file0\x00', 0x10) execveat(r0, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000180), &(0x7f0000000240)=[&(0x7f00000001c0)='-GPL\x00', &(0x7f0000000200)='devtmpfs\x00'], 0x100) mkdir(&(0x7f0000000000)='./file0/file1\x00', 0x42) ioctl$KDSKBLED(r0, 0x4b65, 0xffffffff) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x4000000000000000) utime(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)={0x3ff, 0x9}) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') [ 1340.175907] ISOFS: Unable to identify CD-ROM format. 07:30:54 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:54 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x80ffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:54 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)={[], 0x200000000000000}) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:54 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ad0500]}, 0x10) 07:30:54 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}, 0x6) [ 1340.305032] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1340.377789] ISOFS: Unable to identify CD-ROM format. 07:30:54 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:54 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:54 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0xffffffffffffff9c, 0x3, 0x1, 0x100000001, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa}, 0x20) r2 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x6, 0x84080) r3 = perf_event_open$cgroup(&(0x7f0000000040)={0x7, 0x70, 0x6d58, 0x1, 0x0, 0x4, 0x0, 0x4, 0x48426, 0xc, 0x79d, 0x4, 0x8, 0x1ff, 0x4, 0x5, 0x100000001, 0x0, 0x0, 0x0, 0x80, 0xbc3c, 0xcb9, 0xc35d, 0x3, 0x4, 0x2115, 0x0, 0x1, 0x0, 0x1, 0x5, 0x3, 0xff, 0xfffffffffffffff8, 0x8, 0x9, 0x0, 0x0, 0x6, 0x3, @perf_config_ext={0x8000, 0x4}, 0x2, 0x1fc000000000, 0x8, 0x0, 0x401, 0x3ff, 0xffffffffffff7fff}, r1, 0xd, r2, 0x8) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r5, r6, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x5d, &(0x7f0000000580), 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f00000001c0)={r0}) ioctl$KVM_RUN(r6, 0xae80, 0x0) 07:30:54 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000007000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:54 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)={[], 0x700000000000000}) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:54 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20480]}, 0x6) 07:30:54 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62d02]}, 0x10) 07:30:54 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) [ 1340.479517] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:54 executing program 6: creat(&(0x7f0000000440)='./file1\x00', 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:30:55 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000020000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:55 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:55 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:55 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) [ 1340.584469] ISOFS: Unable to identify CD-ROM format. 07:30:55 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}, 0x6) 07:30:55 executing program 6: r0 = userfaultfd(0x80000) socketpair(0x15, 0x5, 0xfffffffffffffffa, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) utimes(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)={{r3, r4/1000+10000}}) getsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f00000000c0), &(0x7f0000000100)=0x4) bind$bt_sco(r1, &(0x7f0000000480)={0x1f, {0x29e, 0xfffffffffffff186, 0xd4, 0x2fe, 0x5, 0xeab}}, 0x8) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000006000)={0xaa}) ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x1) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f00000002c0)) r5 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x5, 0x80004) accept4$netrom(r2, &(0x7f0000000140), &(0x7f00000001c0)=0x10, 0x807ff) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa, 0x16}) ioctl$UFFDIO_WAKE(r5, 0x8010aa02, &(0x7f0000000240)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}) bind$netlink(r5, &(0x7f0000000440)={0x10, 0x0, 0x25dfdbfc, 0x81000184}, 0xc) setsockopt$inet6_dccp_buf(r0, 0x21, 0x2, &(0x7f0000000300)="bc625963b4c4113bcbd81b96a2126580dd816a669e31c00271928e52c1dc7c85bf0b74a27a7fd152c09eb37d4b3df5edbe6c545542996be872eeaf4b93d0f2a73928fb83fa667848da85ce4b591daeebba15bf256299b3b572e074a7134d2463de838ecca53f78cfca9838aa1700b74e16b29d6d89c78dda6f72670db17f13fee9847a40e574078d9b1c7a3f0ed4918f83db1bbdafd7c41d0a4155c0a0606192c95f5c684436fdaa7c9d15efa13ad916b9d7882be7d69f6cbefc02a9388fa22e4127bc41092caeccc986d0d83f186eff34b7b210e93d14a0cc7cffac0aa7f8a0e6935a8466f73d30c2954c25938e55b3", 0xf0) ioctl$UFFDIO_REGISTER(r0, 0x8010aa02, &(0x7f0000000400)={{&(0x7f0000009000/0x4000)=nil, 0x4000}, 0x2}) [ 1340.642489] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:55 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffcb]}, 0x10) 07:30:55 executing program 6: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1000000000001, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, {0x0, 0x0, 0x0, 0x3}, 0x0, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f00000000c0), &(0x7f0000000100)=0xc) 07:30:55 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:55 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:55 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)={[], 0x8226000000000000}) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:55 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:55 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000001000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:55 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2e5f0c00]}, 0x6) [ 1340.827290] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:55 executing program 6: openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x200, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x80040, 0x0) connect$netrom(r0, &(0x7f0000000080)=@ax25={0x3, {"28d4204f254d5c"}, 0xffffffffffffffff}, 0x10) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = dup2(r1, r1) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000240)={[], 0x0, 0x6}) 07:30:55 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:55 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:55 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:55 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000000000000000023000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) [ 1340.950444] ISOFS: Unable to identify CD-ROM format. 07:30:55 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000000]}, 0x10) [ 1341.003335] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:55 executing program 6: syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000000440)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) r2 = memfd_create(&(0x7f0000000480)='bdev-bdevmime_typecpuset\x00', 0x0) dup2(r2, r0) 07:30:55 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)={[], 0x4800000000000000}) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:55 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000]}, 0x6) 07:30:55 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:55 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a0000000000000000000000096e000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:55 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:55 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:55 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80300555]}, 0x10) 07:30:55 executing program 6: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = getpgrp(0x0) r2 = gettid() rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xffffffffffffff7f}, 0x0, 0x8) rt_sigprocmask(0x1, &(0x7f0000000000)={0x8}, &(0x7f0000000040), 0x8) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000ff8)={0xfffffffffffffdb0}, 0x8, 0x0) rt_tgsigqueueinfo(r1, r2, 0x4000000000018, &(0x7f0000000100)) read(r3, &(0x7f0000481000)=""/128, 0x20481080) [ 1341.220991] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1341.238440] ISOFS: Unable to identify CD-ROM format. 07:30:55 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a0000000000c0ed000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:55 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:55 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:55 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff]}, 0x6) 07:30:55 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)={[], 0x5000000}) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:55 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) [ 1341.419962] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1341.509747] ISOFS: Unable to identify CD-ROM format. 07:30:55 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:55 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x10) 07:30:55 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:55 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:55 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000000000600000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:55 executing program 6: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000340)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$DRM_IOCTL_RES_CTX(r0, 0x401c5820, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) r1 = geteuid() ioctl$TUNSETOWNER(r0, 0x400454cc, r1) 07:30:55 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)={[], 0x4c000000}) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:55 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1f5f0c00]}, 0x6) [ 1341.581330] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:56 executing program 6: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f0000000040)) r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x6857b21ff1155d93) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="874d8650f6dd7d1a0d0cc47a8c280000006b0bc8136a590aec3c27ad93fab083922d392599b3c04d9d779bcef79f1ccf31cfbf0943b05c6bdfda2f92c8d2d8ce2c391a2b9d9e65e3f3e2c7cbbab5e9601eb3bf135a3ea3"], 0x1) ftruncate(r0, 0x0) 07:30:56 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a000000000000000fff00000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:56 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:56 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:56 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x1400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:56 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xb3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e65826f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000118000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f00002a4000/0x3000)=nil) 07:30:56 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}, 0x6) [ 1341.791270] ISOFS: Unable to identify CD-ROM format. 07:30:56 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000000000000000003000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:56 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) [ 1341.820868] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:56 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f4]}, 0x10) 07:30:56 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:56 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="1941b722a7a6d34535fd5182f8076d368b2cb0c9625ca1f01e1308cdf807c3ad1119b66ba934fbaf617d53c629cd4a70462ec085165dc16b3e3792a7fc796eca0273b16b7081451731822a058184dc3f1262cb522db8c40ed534337e3746b6c91d5b0e7044e4af3596c29a5aab078c04463d4e5a6dd03fafa3232875ba90d49f90bdf430e98c0908a0e30d48efe0c58baade4b91d4124f25db0dff1e8e6c57aa14d93c91afa441cd8a9793e488383a97bbcb38e983843814200cca6c2cae99120fcba0ffb0016974457bc8d322cf92d5a653a33f77075e046c0aa5778e29789fff1d170eddc5002433b527ef2be8e85043015f89cdea881d9855b2047fdcef0e9d8c50e9fed623ecebd2e45ffd45425753b4bf8350b303ccec3701d86ff877d83b5570f1e9cf1f06bd6393070b6c09b09fc35b3b95eb3101d339be266ba2a3e8c05b5b0457aebc111fafea3e12b609732c0a64ad89bba1cd4bf36458cfa4f84f43f45a9f05ed89c01214bdd686683c2fd1187a29f3fa20b75cf2acf486154d967b6062d14ab847fb73e08e9984d058d1fddefeaf73c749b3eed06d9007180a0251cf2eddd2678d175828ba09c90884c4687cbb75e7f06f06ac2c8f5ebb502778444c24c80ca0e1415cf8a2cbe248d4fd712afb33bf4d44206089b2ce0fbf710b409fce14271f2085687e3b93ad84a2894a63d90bd63a7258918f0dbd225f58", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)={[], 0x700}) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) [ 1342.026610] ISOFS: Unable to identify CD-ROM format. 07:30:56 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, "0000000000000000000000000000000000000000000000000000000000000006", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:56 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:56 executing program 6: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x871, 0x20101) ioctl$EVIOCGPROP(r1, 0x80404509, &(0x7f0000000000)=""/84) setsockopt$sock_attach_bpf(r0, 0x10d, 0xf, &(0x7f00000000c0)=r1, 0x4) 07:30:56 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a0000000000001f000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:56 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x900]}, 0x6) 07:30:56 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:56 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)={[], 0x300}) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:56 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000000000]}, 0x10) [ 1342.116963] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:56 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x2, 0x28021) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") write$evdev(r0, &(0x7f0000000040)=[{{}, 0x1, 0x49, 0x2}, {}], 0x30) 07:30:56 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a0000000000000000000000003f000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:56 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:56 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) [ 1342.282200] ISOFS: Unable to identify CD-ROM format. [ 1342.316928] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:56 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80300e33]}, 0x10) 07:30:56 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0xffff8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:56 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xc5f2d]}, 0x6) 07:30:56 executing program 6: socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) socket$kcm(0xa, 0x1, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x32, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x4, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00'}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x100000000012, 0x3, 0x20000000000004, 0xf728}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r1, &(0x7f0000000080), &(0x7f0000000200)="1ff91b8f277243754608ffb75164fc031f10ec907a9c47e3ad89559d05d170d76e1e4030701784b2827fc3779f6755e15d1f8953214545714d0f9059cd3743b91ec6f6732ead8ee5367a4c6f5f205e004c175a6ecb05e0425fdb4d4517a1d60fa4b105773b3107a9d1b3f297e05abe44b8dd586bc1e3a5cd"}, 0x20) 07:30:56 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)={[], 0x30c64}) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:56 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a000000000000000000fffffffb000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:56 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:56 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:56 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1342.460912] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:56 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:56 executing program 6: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0xfffffffffffffffc) socket$xdp(0x2c, 0x3, 0x0) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000080)) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000040)) 07:30:56 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xe803000000000000]}, 0x6) [ 1342.518473] ISOFS: Unable to identify CD-ROM format. 07:30:56 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000000002000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:56 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, "0000000000000000000000000000000000000000000000000000000000000004", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:57 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)={[], 0x6000000000000000}) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:57 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1342.637946] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:57 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28000000]}, 0x10) 07:30:57 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x2000, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x1f, 0x200000}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000140)={r2, 0x4}, 0x8) get_mempolicy(&(0x7f0000000080), &(0x7f00003e8000), 0x401, &(0x7f0000336000/0x3000)=nil, 0x3) setsockopt$RDS_GET_MR(r1, 0x114, 0x2, &(0x7f0000000240)={{&(0x7f0000000180)=""/115, 0x73}, &(0x7f0000000200), 0x8}, 0x20) 07:30:57 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:57 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a0000000000ffffffffffffffff000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:57 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, "0000000000000000000000000000000000000000000000000000000000000002", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) [ 1342.791188] ISOFS: Unable to identify CD-ROM format. [ 1342.840162] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:57 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="19414e544653202020205182f8076d368b2cb0c9625ca1f01e1308cdf807c3ad1119b66ba934fbaf617d53c629cd4a70462ec085165dc16b3e3792a7fc796eca0273b16b6f81451731822a058184dc3f1262cb522db8c40ed534337e3746b6c91d5b0e7044e4af3596c29a5aab078c04463d4e5a6dd03fafa3232875ba90d49f90bdf430e98c0908a0e30d48efe0c58baade4b91d4124f25db0dff1e8e6c57aa14d93c91afa441cd8a9793e488383a97bbcb38e983843814200cca6c2cae99120fcba0ffb0016974457bc8d322cf92d5a653a33f77075e046c0aa5778e29789fff1d170eddc5002433b527ef2be8e85043015f89cdea881d9855b2047fdcef0e9d8c50e9fed623ecebd2e45ffd45425753b4bf8350b303ccec3701d86ff877d83b5570f1e9cf1f06bd6393070b6c09b09fc35b3b95eb3101d339be266ba2a3e8c05b5b0457aebc111fafea3e12b609732c0a64ad89bba1cd4bf36458cfa4f84f43f45a9f05ed89c01214bdd686683c2fd1187a29f3fa20b75cf2acf486154d967b6062d14ab847fb73e08e9984d058d1fddefeaf73c749b3eed06d9007180a0251cf2eddd2678d175828ba09c90884c4687cbb75e7f06f06ac2c8f5ebb502778444c24c80ca0e1415cf8a2cbe248d4fd712afb33bf4d44206089b2ce0fbf710b409fce14271f2085687e3b93ad84a2894a63d90bd63a7258918f0dbd225f58", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:57 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x14000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:57 executing program 6: r0 = socket$inet(0x2, 0x200000002, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_emit_ethernet(0x2a, &(0x7f00000000c0)=ANY=[@ANYBLOB="c9b6adf3fe7b00001400000008004500001c0000000000119078ac144c00e0001001ca66863900004e2100089078"], 0x0) 07:30:57 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a0000000000004c000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:57 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="1941b722a7a6d34535fd5182f8076d368b2cb0c9625ca1f01e1308cdf807c3ad1119b66ba934fbaf617d53c629cd4a70462ec085165dc16b3e3792a7fc796eca0273b16b7081451731822a058184dc3f1262cb522db8c40ed534337e3746b6c91d5b0e7044e4af3596c29a5aab078c04463d4e5a6dd03fafa3232875ba90d49f90bdf430e98c0908a0e30d48efe0c58baade4b91d4124f25db0dff1e8e6c57aa14d93c91afa441cd8a9793e488383a97bbcb38e983843814200cca6c2cae99120fcba0ffb0016974457bc8d322cf92d5a653a33f77075e046c0aa5778e29789fff1d170eddc5002433b527ef2be8e85043015f89cdea881d9855b2047fdcef0e9d8c50e9fed623ecebd2e45ffd45425753b4bf8350b303ccec3701d86ff877d83b5570f1e9cf1f06bd6393070b6c09b09fc35b3b95eb3101d339be266ba2a3e8c05b5b0457aebc111fafea3e12b609732c0a64ad89bba1cd4bf36458cfa4f84f43f45a9f05ed89c01214bdd686683c2fd1187a29f3fa20b75cf2acf486154d967b6062d14ab847fb73e08e9984d058d1fddefeaf73c749b3eed06d9007180a0251cf2eddd2678d175828ba09c90884c4687cbb75e7f06f06ac2c8f5ebb502778444c24c80ca0e1415cf8a2cbe248d4fd712afb33bf4d44206089b2ce0fbf710b409fce14271f2085687e3b93ad84a2894a63d90bd63a7258918f0dbd225f58", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)={[], 0x2000000000000000}) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:57 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:57 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3400]}, 0x10) 07:30:57 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa5f0c0000000000]}, 0x6) 07:30:57 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000fff000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:57 executing program 6: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x6, 0x400080) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x6, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$ARPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x18, &(0x7f0000000000)={'IDLETIMER\x00'}, &(0x7f0000000080)=0x1) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x2, 0x32, 0xffffffffffffffff, 0x0) close(r1) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f00000000c0)=0x974e) ioctl$KVM_S390_INTERRUPT_CPU(r2, 0x4010ae94, &(0x7f0000000100)={0xdf, 0xfffffffffffffffd, 0x3ff}) 07:30:57 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:57 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1343.028117] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1343.042946] ISOFS: Unable to identify CD-ROM format. 07:30:57 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xd5f0c0000000000]}, 0x6) 07:30:57 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)={[], 0x1f00000000000000}) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:57 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) [ 1343.253392] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1343.260920] ISOFS: Unable to identify CD-ROM format. 07:30:57 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900]}, 0x10) 07:30:57 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="19414e544653202020205182f8076d368b2cb0c9625ca1f01e1308cdf807c3ad1119b66ba934fbaf617d53c629cd4a70462ec085165dc16b3e3792a7fc796eca0273b16b6381451731822a058184dc3f1262cb522db8c40ed534337e3746b6c91d5b0e7044e4af3596c29a5aab078c04463d4e5a6dd03fafa3232875ba90d49f90bdf430e98c0908a0e30d48efe0c58baade4b91d4124f25db0dff1e8e6c57aa14d93c91afa441cd8a9793e488383a97bbcb38e983843814200cca6c2cae99120fcba0ffb0016974457bc8d322cf92d5a653a33f77075e046c0aa5778e29789fff1d170eddc5002433b527ef2be8e85043015f89cdea881d9855b2047fdcef0e9d8c50e9fed623ecebd2e45ffd45425753b4bf8350b303ccec3701d86ff877d83b5570f1e9cf1f06bd6393070b6c09b09fc35b3b95eb3101d339be266ba2a3e8c05b5b0457aebc111fafea3e12b609732c0a64ad89bba1cd4bf36458cfa4f84f43f45a9f05ed89c01214bdd686683c2fd1187a29f3fa20b75cf2acf486154d967b6062d14ab847fb73e08e9984d058d1fddefeaf73c749b3eed06d9007180a0251cf2eddd2678d175828ba09c90884c4687cbb75e7f06f06ac2c8f5ebb502778444c24c80ca0e1415cf8a2cbe248d4fd712afb33bf4d44206089b2ce0fbf710b409fce14271f2085687e3b93ad84a2894a63d90bd63a7258918f0dbd225f58", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:57 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a0000000000ffff1f0000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:57 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:57 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa5f0c00]}, 0x6) 07:30:57 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000180)={0x1d}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000005d40)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x1d, r1}, 0x10, &(0x7f0000000040)={&(0x7f00000000c0)={0x5, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x8, @can={{}, 0x0, 0x0, 0x0, 0x0, "c4d981ae211e6951"}}, 0x20000108}, 0x1}, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x40, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r2, 0x641f) 07:30:57 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:57 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="1941b722a7a6d34535fd5182f8076d368b2cb0c9625ca1f01e1308cdf807c3ad1119b66ba934fbaf617d53c629cd4a70462ec085165dc16b3e3792a7fc796eca0273b16b7081451731822a058184dc3f1262cb522db8c40ed534337e3746b6c91d5b0e7044e4af3596c29a5aab078c04463d4e5a6dd03fafa3232875ba90d49f90bdf430e98c0908a0e30d48efe0c58baade4b91d4124f25db0dff1e8e6c57aa14d93c91afa441cd8a9793e488383a97bbcb38e983843814200cca6c2cae99120fcba0ffb0016974457bc8d322cf92d5a653a33f77075e046c0aa5778e29789fff1d170eddc5002433b527ef2be8e85043015f89cdea881d9855b2047fdcef0e9d8c50e9fed623ecebd2e45ffd45425753b4bf8350b303ccec3701d86ff877d83b5570f1e9cf1f06bd6393070b6c09b09fc35b3b95eb3101d339be266ba2a3e8c05b5b0457aebc111fafea3e12b609732c0a64ad89bba1cd4bf36458cfa4f84f43f45a9f05ed89c01214bdd686683c2fd1187a29f3fa20b75cf2acf486154d967b6062d14ab847fb73e08e9984d058d1fddefeaf73c749b3eed06d9007180a0251cf2eddd2678d175828ba09c90884c4687cbb75e7f06f06ac2c8f5ebb502778444c24c80ca0e1415cf8a2cbe248d4fd712afb33bf4d44206089b2ce0fbf710b409fce14271f2085687e3b93ad84a2894a63d90bd63a7258918f0dbd225f58", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)={[], 0x9a00}) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) [ 1343.387518] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:57 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:57 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000900000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) [ 1343.462936] ISOFS: Unable to identify CD-ROM format. 07:30:57 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x80ffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:57 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xc5f2e]}, 0x6) 07:30:57 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:57 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff0f000000000000]}, 0x10) 07:30:57 executing program 6: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x40000, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f0000000080)={'lo\x00', {0x2, 0x4e20, @multicast2=0xe0000002}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000740)={0x0, 0x0, 'client0\x00', 0x0, "526467f84429e9f3", "4e5cb009720e024b45cfde08b3db7901a44bb65c85b60c805a578f6feabc2278", 0x0, 0x83}) [ 1343.587155] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1343.644549] Unknown ioctl 35100 [ 1343.666129] Unknown ioctl 35100 07:30:58 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:58 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:58 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a000000000000000000fffffff5000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:58 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xc5f21]}, 0x6) 07:30:58 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:58 executing program 6: setrlimit(0x7, &(0x7f0000000080)) perf_event_open(&(0x7f0000000200)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 07:30:58 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9502000000000000]}, 0x10) 07:30:58 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)={[], 0x6000000}) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) [ 1343.790328] __ntfs_warning: 324 callbacks suppressed [ 1343.790338] ntfs: (device loop7): is_boot_sector_ntfs(): Invalid boot sector checksum. [ 1343.803597] ntfs: (device loop7): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 1343.812081] ntfs: (device loop7): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 1343.824160] ntfs: (device loop7): ntfs_fill_super(): Not an NTFS volume. [ 1343.839123] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1343.857398] ntfs: (device loop2): is_boot_sector_ntfs(): Invalid boot sector checksum. [ 1343.865586] ntfs: (device loop2): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 1343.874037] ntfs: (device loop2): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 07:30:58 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2e5f0c0000000000]}, 0x6) 07:30:58 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@text64={0x40, &(0x7f0000000040)="f2446eb960000000b800000100ba000000000f30c74424000f000000c7442402eeae5562c7442406000000000f011c248f4848ed0b6dc4e1fa109df8ffffff400fc79ef000000066b82e010f00d8260f412dfc8700000f01cac442fd21de", 0x5e}], 0x1, 0x0, &(0x7f00000002c0), 0x0) r3 = memfd_create(&(0x7f0000000140)='#em1#+\x00', 0x0) write(r3, &(0x7f0000000040)="06", 0x1) sendfile(r3, r3, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x80000000004, 0x11, r3, 0x0) ioctl$KVM_GET_CPUID2(r2, 0xc008ae91, &(0x7f00000004c0)=ANY=[@ANYBLOB="2000006db5f1f700"]) [ 1343.886150] ntfs: (device loop2): ntfs_fill_super(): Not an NTFS volume. 07:30:58 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000000000000000006000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:58 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1343.922759] ntfs: (device loop7): is_boot_sector_ntfs(): Invalid boot sector checksum. [ 1343.930908] ntfs: (device loop7): read_ntfs_boot_sector(): Primary boot sector is invalid. 07:30:58 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x400000000000000, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) [ 1343.978325] ISOFS: Unable to identify CD-ROM format. 07:30:58 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="19414e544653202020205182f8076d368b2cb0c9625ca1f01e1308cdf807c3ad1119b66ba934fbaf617d53c629cd4a70462ec085165dc16b3e3792a7fc796eca0273b16b2581451731822a058184dc3f1262cb522db8c40ed534337e3746b6c91d5b0e7044e4af3596c29a5aab078c04463d4e5a6dd03fafa3232875ba90d49f90bdf430e98c0908a0e30d48efe0c58baade4b91d4124f25db0dff1e8e6c57aa14d93c91afa441cd8a9793e488383a97bbcb38e983843814200cca6c2cae99120fcba0ffb0016974457bc8d322cf92d5a653a33f77075e046c0aa5778e29789fff1d170eddc5002433b527ef2be8e85043015f89cdea881d9855b2047fdcef0e9d8c50e9fed623ecebd2e45ffd45425753b4bf8350b303ccec3701d86ff877d83b5570f1e9cf1f06bd6393070b6c09b09fc35b3b95eb3101d339be266ba2a3e8c05b5b0457aebc111fafea3e12b609732c0a64ad89bba1cd4bf36458cfa4f84f43f45a9f05ed89c01214bdd686683c2fd1187a29f3fa20b75cf2acf486154d967b6062d14ab847fb73e08e9984d058d1fddefeaf73c749b3eed06d9007180a0251cf2eddd2678d175828ba09c90884c4687cbb75e7f06f06ac2c8f5ebb502778444c24c80ca0e1415cf8a2cbe248d4fd712afb33bf4d44206089b2ce0fbf710b409fce14271f2085687e3b93ad84a2894a63d90bd63a7258918f0dbd225f58", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:58 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1344.063836] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:59 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff00000000]}, 0x6) 07:30:59 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)={[], 0xfffffff6}) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:59 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:59 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000000000000000040000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:59 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x2000000000000000, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:59 executing program 6: capset(&(0x7f00005cf000)={0x19980330}, &(0x7f0000f03fe8)) socketpair$inet(0x2, 0x3, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) linkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x1000) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f00000000c0)={0x0, 0x4, 0x5, [0x0, 0xffffffff, 0x2, 0x10001, 0x10001]}, &(0x7f0000000140)=0x12) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f00000002c0)='./file0\x00', 0x2, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000300)="c7c9056dedff4a76b0b3bd7395c6a5e768eb2105be7c4222415c5cf23bbdc1579321fd6f210fd0f0d5d60acc58e85ba237ae03fe6b5410d4916d72d31b199a40a1091631f8c3f822fc78683be955a1b01bbce48aa0fd956002b293d6225d1d5a45adec302354256829b5efbb53909e3ede628a34529dede4932d358a1f0404f39d6ec849267220d57150e62153753a7a2930812f2bf5a521f68b17f14314413b4ba2230123ee4e87859a", 0xaa, 0x422}], 0x1001, &(0x7f0000000400)={[{@barrier_val={'barrier', 0x3d, [0x0]}, 0x2c}, {@nobarrier='nobarrier', 0x2c}, {@i_version='i_version', 0x2c}]}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000180)={r1, @in6={{0xa, 0x4e20, 0x2, @ipv4={[], [0xff, 0xff], @rand_addr=0xa85}}}, 0x89d, 0x5d, 0xc2, 0x9, 0x101}, &(0x7f0000000240)=0x98) 07:30:59 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff0f]}, 0x10) 07:30:59 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="19414e544653202020205182f8076d368b2cb0c9625ca1f01e1308cdf807c3ad1119b66ba934fbaf617d53c629cd4a70462ec085165dc16b3e3792a7fc796eca0273b16b2e81451731822a058184dc3f1262cb522db8c40ed534337e3746b6c91d5b0e7044e4af3596c29a5aab078c04463d4e5a6dd03fafa3232875ba90d49f90bdf430e98c0908a0e30d48efe0c58baade4b91d4124f25db0dff1e8e6c57aa14d93c91afa441cd8a9793e488383a97bbcb38e983843814200cca6c2cae99120fcba0ffb0016974457bc8d322cf92d5a653a33f77075e046c0aa5778e29789fff1d170eddc5002433b527ef2be8e85043015f89cdea881d9855b2047fdcef0e9d8c50e9fed623ecebd2e45ffd45425753b4bf8350b303ccec3701d86ff877d83b5570f1e9cf1f06bd6393070b6c09b09fc35b3b95eb3101d339be266ba2a3e8c05b5b0457aebc111fafea3e12b609732c0a64ad89bba1cd4bf36458cfa4f84f43f45a9f05ed89c01214bdd686683c2fd1187a29f3fa20b75cf2acf486154d967b6062d14ab847fb73e08e9984d058d1fddefeaf73c749b3eed06d9007180a0251cf2eddd2678d175828ba09c90884c4687cbb75e7f06f06ac2c8f5ebb502778444c24c80ca0e1415cf8a2cbe248d4fd712afb33bf4d44206089b2ce0fbf710b409fce14271f2085687e3b93ad84a2894a63d90bd63a7258918f0dbd225f58", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) [ 1345.130714] kernel msg: ebtables bug: please report to author: Wrong len argument 07:30:59 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:59 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:59 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000000003f00000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) [ 1345.204519] ISOFS: Unable to identify CD-ROM format. 07:30:59 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0xffffff7f00000000, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:59 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, 0x6) 07:30:59 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}, 0x10) 07:30:59 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000040)=0xfffffffffffffffc, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)="47cad1", 0xffffffffffffffdc) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x2) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000000c0)='dctcp\x00', 0x6) sendto$inet6(r1, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}}, 0x1c) 07:30:59 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)={[], 0x4c}) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) [ 1345.323301] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1345.484877] ISOFS: Unable to identify CD-ROM format. 07:30:59 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:30:59 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:59 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000000000100000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:30:59 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x6000000, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:30:59 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8004020000000000]}, 0x6) 07:30:59 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)={[], 0xe000000000000}) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:30:59 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff]}, 0x10) 07:30:59 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x400000890e, &(0x7f0000000100)="2908000000000000001070") r1 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000000)=@broute={"62726f7574650200", 0x20, 0x2, 0x418, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000280], 0x0, &(0x7f0000000240), &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'ip6gretap0\x00', 'syz_tun\x00', 'bond0\x00', 'syz_tun\x00', @link_local={0x1, 0x80, 0xc2}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xa0, 0x138, 0x188, [@pkttype={'pkttype\x00', 0x8}]}, [@common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x10000, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0xd, 0x0, 0x86dd, 'syzkaller0\x00', 'tunl0\x00', 'sit0\x00', 'ifb0\x00', @empty, [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x130, 0x1b0, 0x200, [@ip6={'ip6\x00', 0x50, {{@empty, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}}}, @limit={'limit\x00', 0x20}]}, [@common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}}]}]}, 0x490) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x80000, 0x0) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000006c0)) [ 1345.656227] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1345.665430] ebt_limit: overflow, try lower: 0/0 [ 1345.701127] ebt_limit: overflow, try lower: 0/0 07:31:00 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="19414e544653202020205182f8076d368b2cb0c9625ca1f01e1308cdf807c3ad1119b66ba934fbaf617d53c629cd4a70462ec085165dc16b3e3792a7fc796eca0273b16b5881451731822a058184dc3f1262cb522db8c40ed534337e3746b6c91d5b0e7044e4af3596c29a5aab078c04463d4e5a6dd03fafa3232875ba90d49f90bdf430e98c0908a0e30d48efe0c58baade4b91d4124f25db0dff1e8e6c57aa14d93c91afa441cd8a9793e488383a97bbcb38e983843814200cca6c2cae99120fcba0ffb0016974457bc8d322cf92d5a653a33f77075e046c0aa5778e29789fff1d170eddc5002433b527ef2be8e85043015f89cdea881d9855b2047fdcef0e9d8c50e9fed623ecebd2e45ffd45425753b4bf8350b303ccec3701d86ff877d83b5570f1e9cf1f06bd6393070b6c09b09fc35b3b95eb3101d339be266ba2a3e8c05b5b0457aebc111fafea3e12b609732c0a64ad89bba1cd4bf36458cfa4f84f43f45a9f05ed89c01214bdd686683c2fd1187a29f3fa20b75cf2acf486154d967b6062d14ab847fb73e08e9984d058d1fddefeaf73c749b3eed06d9007180a0251cf2eddd2678d175828ba09c90884c4687cbb75e7f06f06ac2c8f5ebb502778444c24c80ca0e1415cf8a2cbe248d4fd712afb33bf4d44206089b2ce0fbf710b409fce14271f2085687e3b93ad84a2894a63d90bd63a7258918f0dbd225f58", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:31:00 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000000000000000010000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:31:00 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x80ffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:31:00 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x700000000000000, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:31:00 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x10) 07:31:00 executing program 6: r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x2, 0x801) ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xffffffffffffffab, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000108004500001c0000000000009078ac1c14bbac1414aa0000ffff00000000"], &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000200)={0x0, 0x1, 0xffffffff}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e23, 0x4, @mcast2={0xff, 0x2, [], 0x1}, 0x1ea36b2c}}}, &(0x7f0000000340)=0x84) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e24, 0xff, @loopback={0x0, 0x1}, 0x80000001}, 0x1c) mq_open(&(0x7f0000000040)='&$wlan1\\\x00', 0x40, 0x30, &(0x7f00000000c0)={0x2, 0xf0, 0x3, 0x5, 0x3, 0x8, 0xffffffff, 0x2}) 07:31:00 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4002000000000000]}, 0x6) [ 1345.813267] ISOFS: Unable to identify CD-ROM format. [ 1345.861539] kernel msg: ebtables bug: please report to author: Wrong len argument 07:31:00 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:31:00 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)={[], 0xf4ffffff00000000}) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:31:00 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000040)="0700e1311f16f477671070") r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvfrom(r0, &(0x7f0000000140)=""/122, 0x7a, 0x2000, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x4}, 0x1c) getsockname$inet6(r1, &(0x7f0000000080)={0x0, 0x0, 0x0, @ipv4={[], [], @dev}}, &(0x7f0000000100)=0x1c) 07:31:00 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x3000000, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) [ 1346.025554] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1346.099743] ISOFS: Unable to identify CD-ROM format. 07:31:00 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000007ffffffffffff000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:31:00 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)={[], 0x8000000000000000}) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:31:00 executing program 6: r0 = accept$inet(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, @rand_addr}, &(0x7f0000000040)=0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='veno\x00', 0x5) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000400), 0x4) 07:31:00 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe709a455]}, 0x10) 07:31:00 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:31:00 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x500, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:31:00 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x52000000000000]}, 0x6) 07:31:00 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) [ 1346.177549] kernel msg: ebtables bug: please report to author: Wrong len argument 07:31:00 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r0, 0xfffffc61) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e20, @multicast1=0xe0000001}}}, &(0x7f0000000240)=0x84) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000280)={r2, 0xc4, "649d7f9bd89a02152f49c89a3e426f6741f62ee1238cb4b75129ddd85efe4b10b5de319b5cedd4e2b71ae5e69b9b9fc556c8d2fb012f8c9da00419b0e154330fc47c7a8e73efebe2b16b92cabbedfa1347d5925700c6ed4c0e6c8563392a71ba96bf82b38bc37617d81bfb2468e13291a3448d42cb42772942e4d8e4bf1d2cbf94bd051a9daa12a516bbc90578465be372074c8fa92a760f5befb996271fe135ec337c54cd28a3457d637cf91199ed25e2a364ae1e92bad8fcbdab1bca7969c9001b8d9d"}, &(0x7f0000000380)=0xcc) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r3, &(0x7f0000000040), &(0x7f0000000100)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r3, &(0x7f0000000080)}, 0x10) 07:31:00 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000000000800000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:31:00 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) [ 1346.343041] ISOFS: Unable to identify CD-ROM format. 07:31:00 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0xffffff7f, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:31:00 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:31:00 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}, 0x6) 07:31:00 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000074000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:31:00 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf401000000000000]}, 0x10) 07:31:00 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:31:00 executing program 6: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000080)=@assoc_value={0x0, 0x1bc}, 0x8) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000000)=@assoc_id=0x0, &(0x7f0000000040)=0x4) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000180)={r1}, 0xc) 07:31:00 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)={[], 0x4000000000000}) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) [ 1346.480779] kernel msg: ebtables bug: please report to author: Wrong len argument 07:31:00 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a0000000000007a000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:31:00 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="19414e544653202020205182f8076d368b2cb0c9625ca1f01e1308cdf807c3ad1119b66ba934fbaf617d53c629cd4a70462ec085165dc16b3e3792a7fc796eca0273b16b7081451731822a048184dc3f1262cb522db8c40ed534337e3746b6c91d5b0e7044e4af3596c29a5aab078c04463d4e5a6dd03fafa3232875ba90d49f90bdf430e98c0908a0e30d48efe0c58baade4b91d4124f25db0dff1e8e6c57aa14d93c91afa441cd8a9793e488383a97bbcb38e983843814200cca6c2cae99120fcba0ffb0016974457bc8d322cf92d5a653a33f77075e046c0aa5778e29789fff1d170eddc5002433b527ef2be8e85043015f89cdea881d9855b2047fdcef0e9d8c50e9fed623ecebd2e45ffd45425753b4bf8350b303ccec3701d86ff877d83b5570f1e9cf1f06bd6393070b6c09b09fc35b3b95eb3101d339be266ba2a3e8c05b5b0457aebc111fafea3e12b609732c0a64ad89bba1cd4bf36458cfa4f84f43f45a9f05ed89c01214bdd686683c2fd1187a29f3fa20b75cf2acf486154d967b6062d14ab847fb73e08e9984d058d1fddefeaf73c749b3eed06d9007180a0251cf2eddd2678d175828ba09c90884c4687cbb75e7f06f06ac2c8f5ebb502778444c24c80ca0e1415cf8a2cbe248d4fd712afb33bf4d44206089b2ce0fbf710b409fce14271f2085687e3b93ad84a2894a63d90bd63a7258918f0dbd225f58", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) [ 1346.528781] sctp: [Deprecated]: syz-executor6 (pid 9310) Use of int in maxseg socket option. [ 1346.528781] Use struct sctp_assoc_value instead 07:31:00 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x200000000000000, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:31:00 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff]}, 0x6) 07:31:00 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0xffff8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:31:00 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000]}, 0x10) [ 1346.628868] ISOFS: Unable to identify CD-ROM format. [ 1346.638179] sctp: [Deprecated]: syz-executor6 (pid 9310) Use of int in maxseg socket option. [ 1346.638179] Use struct sctp_assoc_value instead [ 1346.672003] kernel msg: ebtables bug: please report to author: Wrong len argument 07:31:01 executing program 6: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x42240, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r0, 0xc008551a, &(0x7f00000001c0)={0x7ff, 0x24, [0x40, 0x8, 0x4, 0x2, 0x2, 0x5, 0x1000, 0x10000, 0x1]}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_DEASSIGN_DEV_IRQ(r2, 0x4040ae75, &(0x7f00000000c0)={0x2, 0x7, 0x3, 0x4}) ioctl$KVM_SET_PIT(r2, 0x8048ae66, &(0x7f0000000000)={[{0x100000001, 0xfffffffffffffff9, 0x8001, 0x1, 0x8, 0xb5, 0x0, 0x1ff, 0xffff, 0x3f, 0x10001, 0xafb, 0x2}, {0x9, 0x101, 0x100000000, 0x7, 0xc6ca, 0x6042, 0x3, 0x200, 0xb2, 0x9, 0x7ff, 0x0, 0x7}, {0x8001, 0x9, 0x1, 0x101, 0x3, 0x7fff, 0x9d, 0x4, 0xfffffffffffffffc, 0x7, 0x7fffffff, 0x347, 0x5}], 0x2}) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f00000002c0)=@ioapic={0x2, 0x0, 0x0, 0x0, 0x0, [{0x5}]}) 07:31:01 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)={[], 0x81000000}) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:31:01 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x300000000000000, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:31:01 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="19414e544653202020205182f8076d368b2cb0c9625ca1f01e1308cdf807c3ad1119b66ba934fbaf617d53c629cd4a70462ec085165dc16b3e3792a7fc796eca0273b16b7081451731822a068184dc3f1262cb522db8c40ed534337e3746b6c91d5b0e7044e4af3596c29a5aab078c04463d4e5a6dd03fafa3232875ba90d49f90bdf430e98c0908a0e30d48efe0c58baade4b91d4124f25db0dff1e8e6c57aa14d93c91afa441cd8a9793e488383a97bbcb38e983843814200cca6c2cae99120fcba0ffb0016974457bc8d322cf92d5a653a33f77075e046c0aa5778e29789fff1d170eddc5002433b527ef2be8e85043015f89cdea881d9855b2047fdcef0e9d8c50e9fed623ecebd2e45ffd45425753b4bf8350b303ccec3701d86ff877d83b5570f1e9cf1f06bd6393070b6c09b09fc35b3b95eb3101d339be266ba2a3e8c05b5b0457aebc111fafea3e12b609732c0a64ad89bba1cd4bf36458cfa4f84f43f45a9f05ed89c01214bdd686683c2fd1187a29f3fa20b75cf2acf486154d967b6062d14ab847fb73e08e9984d058d1fddefeaf73c749b3eed06d9007180a0251cf2eddd2678d175828ba09c90884c4687cbb75e7f06f06ac2c8f5ebb502778444c24c80ca0e1415cf8a2cbe248d4fd712afb33bf4d44206089b2ce0fbf710b409fce14271f2085687e3b93ad84a2894a63d90bd63a7258918f0dbd225f58", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:31:01 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:31:01 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a0000000000096e000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) [ 1346.839458] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1346.958100] ISOFS: Unable to identify CD-ROM format. 07:31:01 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x275f0c00]}, 0x6) 07:31:01 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56010000000000]}, 0x10) 07:31:01 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:31:01 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:31:01 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x6000000000000000, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:31:01 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000005000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:31:01 executing program 6: r0 = socket(0x10, 0x3, 0x0) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)="b65bf60c9b90134486a4118e3d1f04108599febdd4af941c73fc8e98fafa5a324cc5fbab1d9adf2391af2cdf39d4c8d64a", 0x31) ioctl$sock_ifreq(r0, 0x1000089f2, &(0x7f0000000080)={'bond_slave_1\x00', @ifru_data=&(0x7f00000000c0)="907a3ed41bcb69b19f607a10a6cf04cb5c1c80c71459dd0269b671a2d61438fc"}) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-serpent-sse2\x00'}, 0x58) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r1, 0x400, 0x70bd2d, 0x25dfdbff, {0x7}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7f}]}, 0x1c}, 0x1, 0x0, 0x0, 0x48080}, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000002c0)={0x0}, &(0x7f0000000300)=0xc) wait4(r3, &(0x7f0000000340), 0x2, &(0x7f0000000380)) 07:31:01 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)={[], 0xa504}) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) [ 1347.097351] kernel msg: ebtables bug: please report to author: Wrong len argument 07:31:01 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a0000000000feffffff00000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:31:01 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000]}, 0x6) 07:31:01 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:31:01 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x700, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) 07:31:01 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:31:01 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x2, &(0x7f0000000000)=0x0) r2 = memfd_create(&(0x7f00000000c0)="5d656d3047504c6c6fcd73656c6600", 0x2) connect$nfc_raw(r2, &(0x7f0000000100)={0x27, 0x1, 0x2, 0x1}, 0x10) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0x5, r0, &(0x7f0000000280)="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", 0xfc97, 0x81, 0x0, 0x1, r0}]) write$binfmt_script(r0, &(0x7f0000001280)=ANY=[@ANYPTR64=&(0x7f0000001400)=ANY=[@ANYBLOB="56a48beed0c6a53850788770f97764f126aef93c4e91dc7d34f104fb58449c37ad3801cf3ea612752222c9219c63448309360b81e1dff46859a7a7328220f02e761e3926ca08a870700a95ee6b42c8eb4749b662b7456255e0612ad6829156cc9a429b59f16696ea0b80ff76d7b612fd4b267f9e3dadadaf7be341b51387cc5c5515aea4943e5c660ab7d42f222ba21d9dbc72980bd1a95599f6f86a14de6ba22c34b6902e9a2c224e815f3a8221ebad79d3491ee9fcfec60123fd42db173b6f7c4068464bdc0860211fcca2e5bc771c65d51cb092add13a", @ANYRES32=r0]], 0x8) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000140)={0x7, 0x40000000000, 0x10000}) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000180), 0x2dc) 07:31:01 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x10) [ 1347.261305] ISOFS: Unable to identify CD-ROM format. [ 1347.270436] kernel msg: ebtables bug: please report to author: Wrong len argument 07:31:01 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a0000000000f6ffffff00000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:31:01 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x6) 07:31:01 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:31:01 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:31:01 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x2, &(0x7f0000000000)=0x0) r2 = memfd_create(&(0x7f00000000c0)="5d656d3047504c6c6fcd73656c6600", 0x2) connect$nfc_raw(r2, &(0x7f0000000100)={0x27, 0x1, 0x2, 0x1}, 0x10) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0x5, r0, &(0x7f0000000280)="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", 0xfc97, 0x81, 0x0, 0x1, r0}]) write$binfmt_script(r0, &(0x7f0000001280)=ANY=[@ANYPTR64=&(0x7f0000001400)=ANY=[@ANYBLOB="56a48beed0c6a53850788770f97764f126aef93c4e91dc7d34f104fb58449c37ad3801cf3ea612752222c9219c63448309360b81e1dff46859a7a7328220f02e761e3926ca08a870700a95ee6b42c8eb4749b662b7456255e0612ad6829156cc9a429b59f16696ea0b80ff76d7b612fd4b267f9e3dadadaf7be341b51387cc5c5515aea4943e5c660ab7d42f222ba21d9dbc72980bd1a95599f6f86a14de6ba22c34b6902e9a2c224e815f3a8221ebad79d3491ee9fcfec60123fd42db173b6f7c4068464bdc0860211fcca2e5bc771c65d51cb092add13a", @ANYRES32=r0]], 0x8) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000140)={0x7, 0x40000000000, 0x10000}) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000180), 0x2dc) 07:31:01 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x600000000000000, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) [ 1347.451434] kernel msg: ebtables bug: please report to author: Wrong len argument 07:31:01 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'rr\x00'}, {@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x7}}, 0x44) syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)={[], 0x1f00}) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_mount_image$iso9660(&(0x7f0000002c00)='iso9660\x00', &(0x7f0000002c40)='./file0\x00', 0x0, 0x0, &(0x7f0000002cc0), 0x0, &(0x7f0000002d00)) 07:31:01 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x31f) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000280)="295ee1311f16f477671070") sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0000000]}, 0x10) 07:31:01 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:31:01 executing program 6: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/2, 0x2000, 0x800}, 0x18) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r2 = dup3(r1, r0, 0x80000) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f00000000c0)={0x800, 0x8}) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000080)=0x20, 0x4) 07:31:01 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="8da4363a00000000000000000000000008000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000400)=ANY=[]) 07:31:01 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="766574683100000000ffffffffffef00", 0x235) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000200)="85", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, 0x6) 07:31:01 executing program 7: syz_mount_image$ntfs(&(0x7f0000001980)='ntfs\x00', &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a80)=[{&(0x7f0000001a80)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002ac0)) 07:31:01 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000019c0)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000001200), &(0x7f0000000600)=[{0x0, '\x00', 0x4000000, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_team\x00', 'ip6_vti0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xa8, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x0, 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "9aa7907eb1e54a48106abea576b3cefbadabee6d0561f9f1b22ce7ceecccb6fac7c32eb8fa4f5f024e7331ea3bfd044909f45c7d21b7f7fb53a10e4bf8e9e10c"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x4f8) [ 1347.584242] ==================================================================