997e8ff872fe3aae19e543232773c4fdbbfb821ccbf3d914b041b962f38cbfe1b3ce71cc04cea1f7d577be2c98306369d0d0e55100ba082e551dc95e41b3892a226260589ffe7178fe41d80171a67d0757c5f642e0f0cf8679e50d8bd8b05a2b011158b6233d5042e2be36c853e4b1dc7cf5a35558c3c8b6d6880e53", 0xd0}, {&(0x7f0000000940)="ce9a50c7298f34e513bfd954437576f0d50c60360a20da2dbaf882b94541716fe691173d14f5f319587bd3f85697a03c6565bbc3d840ffc4a93b7e7425e85851d386e74ba78a3d690943372e245e618b5b3f06b0d84cd6fa7bd721fd6f5fb047878c383b9bdfa4b0abe73f11f48f805332a6762cb8a93aa53568b07afe18df3d8f3e7d2c6b0ad4df316bc563c5c3cb16a0871249ad2cb997406db6884c3593717630a7be3b0f8049eb74d3a7879dd3da16ee56a390af9298fe2fb50748e7ffa5404f26e89c038e0d", 0xc8}, {&(0x7f0000000a40)="0cb8375a7e99d9cf64f7a8fa10484b4c4ebeb0e76947b3ee2fc25146717dfdeab4f4ee40060c9c8e33697f602eb6ebbd925e6e95ddec35b0", 0x38}, {&(0x7f0000000a80)="155fe620f35207a198a07ec6518467fd3ade76e2a9", 0x15}, {&(0x7f0000000ac0)="14d8bbdb684d7097ee4f7fba1dbf448adde0c43e18fd4f7b85c8a59d772579a8d6c9", 0x22}, {&(0x7f0000000b00)="bab99f08dd54cab3d173bb5254f3105428d938a4233398a93d6238ad93645f78deed630991f4309a0e7a5d278664f0e1f742d577fa046d7c784b66194a5368fac5fc0219a271cd75818dd92af4ceaed1e6c8467b7bd2bb00cb158e68db36fc483dcdc93e47a5324722a7dc5876545680dee7fb0e862cf647c9ff21d56f550d03c87cdb9f5c30464c169d2952f9b33433e133a8b63c96784aad66963ea9171868c7d7f5e2a8292e8f6f763174e52542350bfab62b5a22beb74da781ad21b9da0d5a37372157042daa", 0xc8}, {&(0x7f0000000c00)="d2feaebc1b027fe11d44b503ea5193bb2bc2c3e027a924666eb2dcb7bbaa136da01c2f80d2ab2e616774c864c7a998f5e509e2d597cf208dcbc8aa63d340785e5ab2459aed1d127c67bfb3dcd807ccaf8421ef43d77eb80d1db8e20cededb3d929829fc59683fec791c48976eadf4feccd0d187c2df6ed35eecf76d765d20feba27eaf0e2bd205fbc6c2ddf0419b", 0x8e}], 0x7, &(0x7f0000004180)=[@pktinfo={{0x24, 0x29, 0x32, {@dev={0xfe, 0x80, [], 0x1c}, r7}}}], 0x28}}, {{0x0, 0x0, &(0x7f0000005500)=[{&(0x7f00000041c0)="f532af0e3c46e8f619143328dc4edfa72fe0a8644f02e840c83f7cf3ec949b8baeb30fc8b2e45e0812061bed17117ea7362e6a2dcd914c307a7d7172fe946ceefddf7be5b546c778c9e4720ed81a8d91c1b457bd3a1e0ecfded3b11529e31c68474c5ed70a7d23", 0x67}, {&(0x7f0000004240)="849335b9eab9d5aa14a9de88d0e485d3f03585b027eae453a172c9c870119135be8b59f2a13a634e2459703590091629e467835aa4a827f09ed80ee3dc79682fdf33d932545d025db8fd7ff74095abe86c28012c0e16bf6560c0e9b1d113d9fa79a8270067d3d0d21c2324e74681b6d860bc4a8540399b7738c79851dd045a1c1434c7a0e58c997caccfe0fc2a052aaa4b28cff4a32901c03d45", 0x9a}, {&(0x7f0000004300)="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", 0x1000}, {&(0x7f0000005300)="e06bd8d66fcc9ba5d0b1c3f76a1afce37187624635b5e4d9ee80f3b92d7ad389247369d40d2ea70c511f15f45b0076ab448e1bf9c862c651c4588346e3f83cc0f30a0fc102be8384759890f36145228ba04affd5aee0c1f1a34cd73e5df1427b09c515e5084df38a619d4ab26eadb2b1a437e216b0f32fd9229e0fcc39080f493bc6c346806836bf9eedd531d1507e9378d3503d1f2649e9c7a6c489925d4df5e014b17453b19ba7510eaab0371fce09a7ffffe50d19506f92de4045c383a71909508db4387dd8e75111699aa71a4cd6", 0xd0}, {&(0x7f0000005400)="aa4ceab99c5e7b82e12ce430f10e6084230eb506b437290e428a4e", 0x1b}, {&(0x7f0000005440)="bb240dd0", 0x4}, {&(0x7f0000005480)='i\n', 0x2}, {&(0x7f00000054c0)="2f76ef72ab472f9484021d4aa197eed9a7b2b9a7e19ed28fe2e9eb32a37327e5fd9af15f4fc6522c4b", 0x29}], 0x8, &(0x7f0000005580)=[@tclass={{0x14, 0x29, 0x43, 0x3}}, @tclass={{0x14, 0x29, 0x43, 0x8000}}, @tclass={{0x14, 0x29, 0x43, 0x7e3}}, @dontfrag={{0x14, 0x29, 0x3e, 0x4}}, @flowinfo={{0x14, 0x29, 0xb, 0xffff}}, @dontfrag={{0x14, 0x29, 0x3e, 0x6}}], 0x90}}], 0x3, 0x10) ioctl$sock_inet_SIOCSARP(r6, 0x8955, &(0x7f0000000080)={{0x2, 0x0, @loopback}, {0x0, @random="5c0c59e64658"}, 0x0, {0x2, 0x0, @dev}, 'hwsim0\x00'}) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/rfkill\x00', 0x501000, 0x0) sendmsg$tipc(r5, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:33 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x1800, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:33 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x8fff243c}, 0x10, 0x0}, 0x0) 21:03:33 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x4000000000000}, 0x0) 21:03:33 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:33 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x8fff243c}, 0x10, 0x0}, 0x0) 21:03:33 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r2, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000080)=0x40, 0x4) 21:03:33 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:34 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x100000000000000}, 0x0) 21:03:34 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2600, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 517.352319] protocol 88fb is buggy, dev hsr_slave_0 [ 517.352337] protocol 88fb is buggy, dev hsr_slave_0 [ 517.357435] protocol 88fb is buggy, dev hsr_slave_1 [ 517.362457] protocol 88fb is buggy, dev hsr_slave_1 [ 517.372566] protocol 88fb is buggy, dev hsr_slave_0 [ 517.377638] protocol 88fb is buggy, dev hsr_slave_1 21:03:34 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x3f00, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:34 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000006c0)={0x0, 0x480}, &(0x7f0000000700)=0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000740)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, [0x6, 0xfffffffffffff800, 0x5, 0x7, 0x7, 0x1, 0x6, 0x7, 0x4, 0xd7da, 0x3, 0x4, 0x1, 0x1, 0xe5]}, &(0x7f0000000840)=0x100) close(r1) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000004c0)={{{@in6=@mcast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f00000005c0)=0xe8) sendmmsg$inet(r0, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)="4388710acc6584e3949d193ed04e2d0001c6d4067256956173cc48991490f1564dda8b1dda35f04142d949813d89d2ff98db8240ebfa5e42f57bd52ceb88b2b650b134c7f4e72aba071c74fdaa7db26f0d8674490af62da58434079f2e3f18eadeb2a33c07f2161104c06eda3666ee27df0af03c807e99099057491cb2cecf3cfae8ca37eee0eecb08dbd221b65d788acb7a161247e412ad5c72ba64ac58f37fe1ec5433036c2f6bc68d5fcdeb63d47e23", 0xb1}, {&(0x7f00000001c0)="f5bc9eb39be27c47b3c172ffafa1e021d712324e769fb809fa185b21ee1696553088d8a9280b3aabbfc9019beadf3bbf6efc6d780f6b394d4356af8d89cccf2fdc38a22a40597c75e1761338ca7375ebfb92fc94964b4a18ad5ba5bdfe1b7d57ef1f7b12c2f4269ba58dd7c33f7c9be07b84340fcd58381c671d909f5bd84113a1ba6c309fc2dde47543c55781d85843297f8590a5a88cb4f3d1af3479c5", 0x9e}, {&(0x7f0000000280)="19a21a7e06d95fa838136f7d7fab962e528cdce2e3d81390a99a730ac3b57f6e98956ecf73b7afeb118b992f58041f4090c71ce7fe2688920ad5d9d2ae664cc77ca4f620bd05a603445dd0306f40d9a6dad0e6a8fc57ab389fe88b60fb44c71efa14eaec13dbf67a75", 0x69}, {&(0x7f0000000380)="a709485400c14536a9a8ef277623fce2a6c3b8a2097e6cd0fa3a2246c3b04e58232cc761212b45dfc71cca87ce673407a9166bfa10e671e33ae4d4a049afc52d8cf93fd6171126bb5522fe3d6eb99742ef600315e26ad0d5d6c3b07aebcc736ae4e40eb5d3876e316650b72838f9edfbb32de45335fbcdfb32768fff00b70c72d8ad3ad71e19d08dde53b30aa6ce71fab4b6df675cbfd54872d4c16d1883f2bdeacfd82deefc36b89844aa", 0xab}, {&(0x7f0000000300)="153652861eedc4b400a92b7deda382ffe74e95e18fb45fd9d74718f5f538be102474b199f0199fd3bd98bd2b121144c0258b06755a33f237ac", 0x39}], 0x5, &(0x7f0000000600)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@ra={0x94, 0x6, 0x9}, @timestamp={0x44, 0x14, 0xffffffffffffffc1, 0x3, 0x2, [{[], 0x3}, {[@dev={0xac, 0x14, 0x14, 0x6}], 0xfffffffffffffc01}, {[], 0x6}]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x6}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @rand_addr=0x3000000000}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x35}}], 0x80}}], 0x1, 0x4) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000080), 0xfffffffffffffe9f) sendmsg$tipc(r2, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:34 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, 0x0, 0x0) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x8fff243c}, 0x10, 0x0}, 0x0) 21:03:34 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2800, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect(r1, &(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x1, 0x2, 0x1, 0x2, {0xa, 0x4e20, 0xb19, @mcast2, 0x3}}}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x44932cf8afcb00e1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000240)={{{@in=@empty, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400)=0x0, &(0x7f0000000440)) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r3, &(0x7f0000000540)={0x85, 0x7d, 0x1, {{0x0, 0x62, 0xffffffff, 0x8, {0x0, 0x3, 0x4}, 0x86100000, 0x2, 0xffffffff80000000, 0xc60, 0x1, '{', 0x1d, 'vboxnet0vmnet0,[eth0trusted]-', 0x7, 'trusted', 0xa, '*-$.cpuset'}, 0xe, ':security]self', r4, r5, r6}}, 0x85) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r7) setsockopt$sock_attach_bpf(r8, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r8, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) ioctl$sock_SIOCOUTQNSD(r7, 0x894b, &(0x7f0000000080)) 21:03:34 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x3580, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:34 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x900000000000000}, 0x0) 21:03:34 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r1) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000080), &(0x7f00000000c0)=0x4) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r2, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0x4008000}, 0x0) 21:03:34 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:34 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, 0x0, 0x0) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x8fff243c}, 0x10, 0x0}, 0x0) 21:03:34 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x4000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000004c0)=@assoc_value={0x0, 0x2}, &(0x7f0000000500)=0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000480)={r2, 0x1, 0x1}, &(0x7f0000000300)=0x37) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x2, @mcast2, 0x2}}, 0x8, 0x3}, &(0x7f0000000440)=0x90) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000200)={r7, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x3, 0x7fffffff}, &(0x7f0000000100)=0x90) syz_open_dev$admmidi(&(0x7f00000002c0)='/dev/admmidi#\x00', 0xfffffffffffffffd, 0x40480) close(r5) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r6, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:34 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x20001, 0x0) setsockopt$RXRPC_SECURITY_KEY(r1, 0x110, 0x1, &(0x7f00000000c0)='\x00', 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r3, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:34 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x4800, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:34 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, 0x0, 0x0) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x8fff243c}, 0x10, 0x0}, 0x0) 21:03:34 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0xc00000000000000}, 0x0) 21:03:34 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x4305, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:34 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x4c00, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:34 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x8fff243c}, 0x10, 0x0}, 0x0) 21:03:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) r1 = msgget(0x1, 0x120) msgctl$IPC_STAT(r1, 0x2, &(0x7f0000000080)=""/177) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) setsockopt$inet6_buf(r3, 0x29, 0x20, &(0x7f0000000200)="e638193b38b0c835f9dc0a51d913b92bb36d0a13950f0e5c2ca47b250ff65b95e840aa490df26472c64049cff8e85cf04f767f2e3bb92218de909002121db84e37813b8023", 0x45) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:34 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r2, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0xd1, 0x262040) 21:03:34 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x5ee4c01700000000}, 0x0) [ 518.072367] protocol 88fb is buggy, dev hsr_slave_0 [ 518.077497] protocol 88fb is buggy, dev hsr_slave_1 21:03:34 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x4788, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet6(0xa, 0x4, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000080)=0x1, 0x4) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:34 executing program 1: setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2e, &(0x7f00000001c0)="ba0156b127c34de3ac500ffcdcb44193b402dba9b12581792564ddb6c89b35c3d35b77953599dfe85ddc8de3a26dacc73291451d0920029574bbcdd281dea185a004af4c0991a3e3b621874572b594dc34c52be443056de8863f66f148f7917f1731257b965b233173942cbfb786389eefcfb3ce7147e5c24094326eca80a163f11d57edd80811076f0f46b3ac5c1f2e7477eb3ae5df3767b33624ba70fdcd700cc54df896a338224c5c85712028ab515c598db6e166ae2e6d132a6b8338", 0xbe) setsockopt$TIPC_MCAST_REPLICAST(0xffffffffffffffff, 0x10f, 0x86) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x400, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r1) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x101000, 0x0) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100)=r3, 0x8) sendmsg$tipc(r2, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000080)={r3, 0x4, 0x6, r3}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x208002, 0x0) 21:03:34 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x8fff243c}, 0x10, 0x0}, 0x0) 21:03:34 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x6000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:34 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x8fff243c00000000}, 0x0) 21:03:35 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x4888, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:35 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) write(r0, &(0x7f0000000080)="fdedae7544161afca4f69a31e4cff5eed3132b7410044b8cf6a35f57152d317f386afc7a98287431d34dec4195ca67d8a5f9c27e536c32a93c4c23c942124cee44997d88fdc6bda4540ba20cdb79a31040a106e0850d2f919c368c1885f71640cb9e5a9847e6a92804338858f5740318d63af83dfbebbe1a28ac220226ef9f547fe6651ec00f84950a75bc01f20de8c07166", 0x92) sendmsg$tipc(r2, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:35 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x8fff243c}, 0x10, 0x0}, 0x0) 21:03:35 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0xd001010000000000}, 0x0) 21:03:35 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x8, 0x800) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000200)={0x3, {{0x2, 0x4e24, @broadcast}}, 0x1, 0x1, [{{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x10}}}]}, 0x110) r1 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x2000000000400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3ff) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000100)={0x0, 0x0}) setsockopt$inet_dccp_int(r2, 0x21, 0xa, &(0x7f0000000080)=0x8001, 0x4) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) setsockopt$inet_sctp6_SCTP_EVENTS(r4, 0x84, 0xb, &(0x7f0000000340)={0x9, 0x7fff, 0x3, 0x2, 0x4f86, 0x10001, 0x7f, 0x8, 0xff, 0x40, 0x256}, 0xb) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:35 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x6800, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:35 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x6000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:35 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0xffffffffffff8001, 0x8400) ioctl$UI_DEV_DESTROY(r1, 0x5502) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) rt_sigprocmask(0x1, &(0x7f00000000c0)={0xc400}, &(0x7f0000000100), 0x8) r4 = semget$private(0x0, 0x0, 0x400) stat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$btrfs(&(0x7f00000001c0)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x5, 0x1, &(0x7f0000000300)=[{&(0x7f0000000240)="cb0b5e49ee16cf0e734ee1f71cef7af16a7acf9c3b09c8621cdc75e45b651067ad91340b0ccf321a693ce146d779b13c0e6e895a631070acef635beb214dbf1cb2c9984e0531248601de80c6083d3ca35969a727d1d06b01e3d3a3246e0c075f7978ef460e548bed6a2fd1eb58199ac29bef6e67313ec5e5dd102799f29cfafaf5d5b0794d7a29ea794c4fb2ba5e09e8beff55b33bdc05009d65c79ee53fac603a4e8683ac1c80afda64bb9b6d5490314ab48e", 0xb3, 0x8}], 0x18000, &(0x7f0000000440)={[{@check_int_data='check_int_data'}, {@compress_force='compress-force'}], [{@fsname={'fsname', 0x3d, '/dev/amidi#\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x81}}, {@uid_lt={'uid<', r5}}]}) semctl$SETVAL(r4, 0x3, 0x10, &(0x7f0000000140)=0x503) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r3, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:35 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, 0x0, 0x0) 21:03:35 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x6c00, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:35 executing program 0: r0 = eventfd(0xffff) close(r0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setlease(r3, 0x400, 0x1) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x80000000) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r5, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:35 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x6488, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:35 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0xeffdffff00000000}, 0x0) 21:03:35 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, 0x0, 0x0) 21:03:35 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0xffffff7f00000000}, 0x0) 21:03:35 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x800e, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:35 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FITRIM(r2, 0xc0185879, &(0x7f00000000c0)={0x0, 0xd4, 0x6}) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c, 0x4}, 0x3c) readahead(r1, 0x1, 0x5) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) getsockname$ax25(r5, &(0x7f0000000200)={{0x3, @rose}, [@netrom, @default, @default, @default, @rose, @bcast, @null, @null]}, &(0x7f0000000280)=0x48) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f0000000380)) sendmsg$tipc(r5, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) socketpair(0x8, 0x4, 0x0, &(0x7f0000000100)) 21:03:35 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x7400, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:35 executing program 1: socketpair$unix(0x1, 0x4e96cb00f3e22511, 0x0, &(0x7f00000001c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x80000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f00000003c0)={0xf9, 0x6, 0x6, 0xc7d, 0x80, 0x8}) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000200)={0xffffffff, {{0xa, 0x4e23, 0x2, @empty, 0x5}}}, 0x88) sendmsg$TIPC_NL_NET_SET(r1, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8005}, 0xc, &(0x7f0000000300)={&(0x7f0000000440)=ANY=[@ANYBLOB="b7760ed7964c8a4fe82eed3fe057810e50962ef5", @ANYRES16=r3, @ANYBLOB="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"], 0x12c}}, 0x20000000) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) syz_open_dev$sndpcmp(&(0x7f0000000400)='/dev/snd/pcmC#D#p\x00', 0x4, 0x40400) sendmsg$tipc(r2, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:35 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x8035, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:35 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x4001fc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) r3 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0xffffffffffffffc0, 0x101180) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000200)={0x11, 0x7d, &(0x7f00000000c0)="97c63fb4037aea01c56806d1902fc0424b7eac85cc37e2fa0ce8215521412cbb46d98b0bb98450630ab0bf1349ed2df35df344cbd46b8406426458bf21f0b5e23f3325e12e5b4381ffd80340be565191bd7220386eaf328218ad232ff1c7e969a95845c690b101bc9c3ebb75b0134ce720a3c97d18f161a55a8bf60837"}) write$P9_RLINK(r3, &(0x7f0000000240)={0x7, 0x47, 0x2}, 0x7) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) ioctl$VIDIOC_ENUMSTD(r3, 0xc0485619, &(0x7f0000000280)={0x100, 0x10000, "e757b58af488cd6e98df20f79488bc078f7bd2abeb8e90f3", {0x6, 0x2ad4}, 0x20}) ioctl$BLKIOOPT(r3, 0x1279, &(0x7f00000002c0)) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r5, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) setsockopt$TIPC_MCAST_BROADCAST(r0, 0x10f, 0x85) 21:03:35 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0xffffffff00000000}, 0x0) 21:03:35 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, 0x0, 0x0) 21:03:35 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) readv(r0, &(0x7f0000000140)=[{&(0x7f00000001c0)=""/89, 0x59}], 0x1) ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f00000000c0)) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0xc000000000000, 0x800) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r3, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:35 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x8100, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:35 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x7a00, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:35 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x400, 0x0) r1 = geteuid() ioctl$SIOCAX25DELUID(r0, 0x89e2, &(0x7f0000000240)={0x3, @null, r1}) r2 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x6, 0x20000) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000280)=r0) ioctl$KVM_SET_SIGNAL_MASK(r2, 0x4004ae8b, &(0x7f0000000380)={0x50, "5d7b0d523b74e1492bfccbbbc204e78b18a344987fd418a68b2e7eb8cae6f98ff003543bb2b480c730e1a1fefe5faf68b77e3b2e0cb6368775df0b82c5a926623f5a738e85b79eff7c3c93f8bc099019"}) setsockopt$inet6_dccp_int(r2, 0x21, 0x3, &(0x7f0000000300)=0x3f, 0xffffffffffffffb2) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$SIOCAX25DELFWD(r0, 0x89eb, &(0x7f0000000100)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0xfffffffffffffe61) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x6) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r6) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x127) r8 = gettid() ioctl$sock_SIOCSPGRP(r5, 0x8902, &(0x7f0000000080)=r8) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f00000002c0), 0x10, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0) 21:03:35 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 21:03:35 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x4}, 0x0) 21:03:36 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r2, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:36 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x8847, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:36 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) sync() socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r4) ioctl$NBD_DISCONNECT(r0, 0xab08) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r5, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:36 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 21:03:36 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0xd203, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:36 executing program 1: socketpair$unix(0x1, 0x80007, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, [], 0x0, r1, 0xfffffffffffffffc}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) io_setup(0x4, &(0x7f00000015c0)) close(r2) sendmsg$tipc(r2, &(0x7f0000000300)={&(0x7f00000000c0)=@id={0x1e, 0x3, 0x2, {0x4e22, 0x1}}, 0x10, &(0x7f0000001440)=[{&(0x7f0000000100)="2507d7966c55f19bd7510ca1adcdfaf8ded16403335c4633a241137b362c22e00bfd97414388a8dcc823881831b0ab5836dbb1f8ec47bff94f8c687c37632f96195708f96d04ca541eb4aa29ddc01f64eb121b967326f4ba4cbb122ef7ce0e599d3aa02a7a03c8", 0x67}, {&(0x7f00000001c0)="e81f5a346e585513a5c4d099b8692c814b28c3ab7751528ba7fbf0d701c8086fa7fd985475147d153da72ddd603566080cc6dee77e4db648f487c4dfc0c2cf4b12270292fdabd1e7cec2ff6497fd7811e0fb0101c2fbfa1a117d595537b38c2a33be3ab5ab5ee50526", 0x69}, {&(0x7f0000000240)="c61876bc84a3d91d21b08eb16eb57746292182f76cab2231fde5e5e8aa2a504c53fec9b10301758cbf4c3757b7176f3b864aee3417d28ca00b67e241e097ec63d151f3b3c956ff8f62f2548489aa8c75ba2c0126ad8234f1eaa37b604c2443b831ef443c54d9", 0x66}, {&(0x7f0000000380)="62b043411c4b7f7e48a593ec7bf8ade2cf25e453b069a89281cb2d8b417568100893d951fbedf43544517ab1506b788f85c7fae6f6704bbecaa04769c51f662e16ba64aa9740f41d97fb3bb0b9122e09435fcb2079f9ef359ef7978bb082d4846bd5bee6d6125a3862adb0e8c3859bf879997ec6e171944c2f2d68123d32082d054c82c3b4872d9b839d51589b0d76187fb7d51cb27be46b854bfa5e07b6da6b19ec9b52f8b2cde1f8583ddcb0da16e8f2b8c90aa7a5b4bd", 0xb8}, {&(0x7f0000000440)="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", 0x1000}, {&(0x7f00000002c0)="5355a663cd52e08c3da54efba9c73788dc3c0aba80dd67d9329d5d87e2b2633c", 0x20}], 0x6, &(0x7f00000014c0)="b55836dd51076e4bb800348fe7e2de0c4036e4720792c09800d38dcc9dca0ef76d6c0d48db71e0ee68364ae527809cd4b1842b3f0f96ef2f3af8f95e536e6729a8a88b45dc063fb54e275d73d6eab3fcac03536b12e11efb78b45d1756d7bbda67a9201a0af6485f4e726d58d8784ebac7a465306ee2ccf3bd09bdcc78aa6b6f6ecd0acd0b82578d5f400e66ea1d2086efdccf201ba390cd32563d470caca9f0fec28d7e0356f369af061b1cd32c890e310fb735ca4cb04028c8a8b8ca2c1cc5e979875f643264ec8ef8aead30e2872450c38bd758b1dd0a0aea07ce3caaf654282167bdf4dde8219e3bec63c9e3d9fdfc5ac0218630a365a73a454e4f60", 0xfe, 0x14}, 0x10) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r3, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:36 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x8848, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:36 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x9}, 0x0) 21:03:36 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 21:03:36 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x8864, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:36 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0xedc0, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x1, 0x30}, &(0x7f0000000200)=0xc) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r4, 0x7, 0xed, "6473b261e7539a1b5b0d4df86672253ee6df1c05bf63240a96aa2a7fb45f44fe00deee6e4888c22221ca6fec63b997734491f5ef4635d0b3962caf1b60cf5b9b80f813f203a1cd8fbdf2130cc9cf7e89cdceee3a19fefbf33040c08e982a1ed45c21a6037f716ee10d41d2928a8aefdaf48cab0a690a122c3885468e8c4706f1e3d52273f12df7ce099bf500cc116374010059e019a3e9b3c38c9a56cad61428bde8bca5cf9359773191a25373674ad6e22520dd23469c6e1175f7aca34c65a1b8acc847363c93c71ef5f0cd3a32288182ca4f3f03182c6f26fb693debcfedb4da52a9ad0da423f286603dc47b"}, 0xf5) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r7 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x1, 0x105000) ioctl$PIO_UNIMAPCLR(r7, 0x4b68, &(0x7f00000000c0)={0x6, 0x7, 0xffff}) close(r5) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r6, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:36 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x3, 0x80000, 0xfffffffffffffff6, &(0x7f0000000340)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r2, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:36 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0xc}, 0x0) 21:03:36 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:36 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x8906, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x2, 0x22000) ioctl$DRM_IOCTL_AGP_RELEASE(r3, 0x6431) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r5, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000080)={0x5, 0x40, 0x5, 0x800, 0x1, [{0x1000, 0xff, 0x1ff, 0x0, 0x0, 0x2}]}) 21:03:36 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:36 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:36 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0xe803, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:36 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x900}, 0x0) 21:03:36 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000080)=0xe2a7, 0x8) sendmsg$tipc(r2, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) prctl$PR_SET_TSC(0x1a, 0x2) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0x108, r5, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0xe4, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb7e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}]}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1ff}]}]}, 0x108}, 0x1, 0x0, 0x0, 0xc804}, 0x10) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:36 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0xe0000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:36 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:36 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0xf000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:36 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x81, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) ioctl$PPPOEIOCSFWD(r2, 0x4008b100, &(0x7f0000000080)={0x18, 0x0, {0x4, @broadcast, 'tunl0\x00'}}) sendmsg$tipc(r2, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:36 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0xc00}, 0x0) 21:03:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x25c}, 0x0) 21:03:36 executing program 4: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000140)="d50a0266617be7b0e437a25e3645e57e", 0x10) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e23, @remote}, 0x382, 0x0, 0x0, 0x0, 0x100000000, &(0x7f0000000080)='vcan0\x00', 0xfffffffffffffff9, 0x0, 0xffffffff80000001}) sendmsg$tipc(r2, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:36 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x1414ac, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:37 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xb71) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000100)={r4, 0x1, 0x6, @dev={[], 0x21}}, 0x10) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x40000000, 0x400000) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r6, 0xc0a85320, &(0x7f00000001c0)={{0xfffffffffffffff8, 0xcf9}, 'port0\x00', 0x10, 0x2, 0x2f59, 0x7f, 0x8, 0x7ff, 0x9, 0x0, 0x0, 0x6}) ioctl(r5, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000080)={0x400}) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCSETS(r7, 0x8910, 0x0) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r3, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0xfffffffffffffd19}, 0x0) 21:03:37 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x1fffff, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x83f4753a5524b917, 0x80) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000200)) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x2400, 0x0) ioctl$KDMKTONE(r4, 0x4b30, 0x966) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r1) ioctl$IOC_PR_PREEMPT(r4, 0x401870cb, &(0x7f00000000c0)={0x3, 0xd34, 0x8000, 0xffffffffffffffe0}) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r5, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:37 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x101d0}, 0x0) 21:03:37 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0xf0ffff, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:37 executing program 4 (fault-call:9 fault-nth:0): socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:37 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x6b6b6b, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:37 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x1000000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) r4 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x7f4, 0xf12ba9bb121b52e) getdents64(r4, &(0x7f0000000240)=""/151, 0x97) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r3, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) r5 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x7, 0x400) ioctl$KVM_PPC_GET_SMMU_INFO(r5, 0x8250aea6, &(0x7f00000000c0)=""/75) [ 520.753168] FAULT_INJECTION: forcing a failure. [ 520.753168] name failslab, interval 1, probability 0, space 0, times 0 [ 520.764498] CPU: 0 PID: 27935 Comm: syz-executor.4 Not tainted 4.19.68 #42 [ 520.771547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 520.781357] Call Trace: [ 520.783969] dump_stack+0x172/0x1f0 [ 520.787796] should_fail.cold+0xa/0x1b [ 520.791793] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 520.797091] ? tipc_service_find+0x16a/0x3d0 [ 520.801612] ? find_held_lock+0x35/0x130 [ 520.805695] __should_failslab+0x121/0x190 [ 520.809945] should_failslab+0x9/0x14 [ 520.813764] kmem_cache_alloc_trace+0x4b/0x760 [ 520.818455] ? lock_acquire+0x16f/0x3f0 [ 520.822450] tipc_dest_push+0x14f/0x320 [ 520.826449] tipc_nametbl_lookup+0x59b/0xa60 [ 520.830963] __tipc_sendmsg+0x4a4/0x1500 [ 520.835044] ? __lock_acquire+0x6ee/0x49c0 [ 520.839471] ? tipc_sendmcast+0xc70/0xc70 [ 520.843639] ? lock_downgrade+0x810/0x810 [ 520.848240] ? __lock_acquire+0x6ee/0x49c0 21:03:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) [ 520.852484] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 520.858031] ? avc_has_perm+0x404/0x610 [ 520.862017] ? __lockdep_init_map+0x10c/0x5b0 [ 520.866527] __tipc_sendstream+0x831/0xaa0 [ 520.870784] ? lock_sock_nested+0xac/0x120 [ 520.875044] ? tipc_sendmsg+0x80/0x80 [ 520.879033] ? mark_held_locks+0xb1/0x100 [ 520.883368] ? __local_bh_enable_ip+0x15a/0x270 [ 520.888224] ? lock_sock_nested+0xe2/0x120 [ 520.892467] ? __local_bh_enable_ip+0x15a/0x270 [ 520.897328] ? __local_bh_enable_ip+0x15a/0x270 [ 520.902123] tipc_sendstream+0x53/0x80 [ 520.906023] tipc_send_packet+0x41/0x60 [ 520.910004] ? tipc_sendstream+0x80/0x80 [ 520.914073] sock_sendmsg+0xd7/0x130 [ 520.918240] ___sys_sendmsg+0x803/0x920 [ 520.922842] ? copy_msghdr_from_user+0x430/0x430 [ 520.927620] ? lock_downgrade+0x810/0x810 [ 520.931795] ? kasan_check_read+0x11/0x20 [ 520.936486] ? __fget+0x367/0x540 [ 520.939966] ? iterate_fd+0x360/0x360 [ 520.944053] ? __fget_light+0x1a9/0x230 [ 520.948051] ? __fdget+0x1b/0x20 21:03:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) remap_file_pages(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x8, 0x6, 0x800) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r3, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) [ 520.951431] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 520.957069] __sys_sendmsg+0x105/0x1d0 [ 520.961102] ? __ia32_sys_shutdown+0x80/0x80 [ 520.965536] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 520.970308] ? do_syscall_64+0x26/0x620 [ 520.974377] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 520.980622] ? do_syscall_64+0x26/0x620 [ 520.984634] __x64_sys_sendmsg+0x78/0xb0 [ 520.988716] do_syscall_64+0xfd/0x620 [ 520.994014] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 520.999221] RIP: 0033:0x459879 [ 521.002509] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 521.021506] RSP: 002b:00007fa00495fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 521.029315] RAX: ffffffffffffffda RBX: 00007fa00495fc90 RCX: 0000000000459879 [ 521.036684] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000007 [ 521.043977] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 21:03:37 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x40000}, 0x0) [ 521.051347] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa0049606d4 [ 521.058635] R13: 00000000004c7802 R14: 00000000004dd078 R15: 0000000000000006 21:03:37 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x8000, 0x2, 0xfffffffffffffffd, 0x40, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) getsockopt$EBT_SO_GET_INFO(r2, 0x0, 0x80, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x78) close(r1) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) connect$tipc(r2, &(0x7f0000000080)=@name={0x1e, 0x2, 0x3, {{0x42, 0x2}, 0x4}}, 0x10) sendmsg$tipc(r3, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:37 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:37 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) timerfd_create(0x0, 0x80800) close(r0) setsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f0000000080)=0x1, 0x4) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r5, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:37 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 521.296408] __ntfs_error: 77 callbacks suppressed [ 521.296419] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. 21:03:38 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x1000000}, 0x0) [ 521.374022] ntfs: (device loop5): read_ntfs_boot_sector(): Could not find a valid backup boot sector. 21:03:38 executing program 4 (fault-call:9 fault-nth:1): socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:38 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) socketpair(0x3, 0x5, 0xaba, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r5, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x33c}, 0x0) 21:03:38 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x3000000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:38 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r2, 0x800442d4, 0xfffffffffffffffd) close(r1) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r3, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) [ 521.478105] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. [ 521.583283] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 521.635732] FAULT_INJECTION: forcing a failure. [ 521.635732] name failslab, interval 1, probability 0, space 0, times 0 [ 521.648572] CPU: 1 PID: 27991 Comm: syz-executor.4 Not tainted 4.19.68 #42 [ 521.655600] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 521.664969] Call Trace: [ 521.667665] dump_stack+0x172/0x1f0 [ 521.671318] should_fail.cold+0xa/0x1b [ 521.675221] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 521.680340] ? __lock_is_held+0xb6/0x140 [ 521.684427] __should_failslab+0x121/0x190 [ 521.688689] should_failslab+0x9/0x14 [ 521.692501] kmem_cache_alloc_trace+0x4b/0x760 [ 521.697087] ? lock_acquire+0x16f/0x3f0 [ 521.701076] tipc_dest_push+0x14f/0x320 [ 521.705074] tipc_nametbl_lookup+0x59b/0xa60 [ 521.709590] __tipc_sendmsg+0x4a4/0x1500 [ 521.713679] ? tipc_sendmcast+0xc70/0xc70 [ 521.717835] ? lock_downgrade+0x810/0x810 [ 521.722164] ? __lock_acquire+0x6ee/0x49c0 [ 521.726586] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 521.732129] ? avc_has_perm+0x404/0x610 [ 521.736113] ? __lockdep_init_map+0x10c/0x5b0 [ 521.740626] __tipc_sendstream+0x831/0xaa0 [ 521.744877] ? lock_sock_nested+0xac/0x120 [ 521.749204] ? tipc_sendmsg+0x80/0x80 [ 521.753017] ? mark_held_locks+0xb1/0x100 [ 521.757191] ? __local_bh_enable_ip+0x15a/0x270 [ 521.761855] ? lock_sock_nested+0xe2/0x120 [ 521.766087] ? __local_bh_enable_ip+0x15a/0x270 [ 521.766109] ? __local_bh_enable_ip+0x15a/0x270 [ 521.766128] tipc_sendstream+0x53/0x80 [ 521.766141] tipc_send_packet+0x41/0x60 21:03:38 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x4000000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:38 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x37, &(0x7f0000000340)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r2, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:38 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x9000000}, 0x0) [ 521.766150] ? tipc_sendstream+0x80/0x80 [ 521.766162] sock_sendmsg+0xd7/0x130 [ 521.766176] ___sys_sendmsg+0x803/0x920 [ 521.795253] ? copy_msghdr_from_user+0x430/0x430 [ 521.800029] ? lock_downgrade+0x810/0x810 [ 521.804630] ? kasan_check_read+0x11/0x20 [ 521.808794] ? __fget+0x367/0x540 [ 521.812262] ? iterate_fd+0x360/0x360 [ 521.816080] ? __fget_light+0x1a9/0x230 [ 521.816096] ? __fdget+0x1b/0x20 [ 521.823417] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 521.823436] __sys_sendmsg+0x105/0x1d0 21:03:38 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$sock_inet_udp_SIOCOUTQ(r2, 0x5411, &(0x7f00000000c0)) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x5, 0x7, 0x50, &(0x7f0000000100)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) ioctl(r0, 0x0, &(0x7f0000000380)="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") syz_init_net_socket$rose(0xb, 0x5, 0x0) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x8905, &(0x7f0000000080)) [ 521.823450] ? __ia32_sys_shutdown+0x80/0x80 [ 521.823475] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 521.823488] ? do_syscall_64+0x26/0x620 [ 521.823501] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 521.823516] ? do_syscall_64+0x26/0x620 [ 521.855659] __x64_sys_sendmsg+0x78/0xb0 [ 521.859743] do_syscall_64+0xfd/0x620 [ 521.863558] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 521.868749] RIP: 0033:0x459879 [ 521.871949] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 521.890940] RSP: 002b:00007fa00495fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 521.890957] RAX: ffffffffffffffda RBX: 00007fa00495fc90 RCX: 0000000000459879 [ 521.890970] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000007 [ 521.913266] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 521.920639] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa0049606d4 [ 521.928010] R13: 00000000004c7802 R14: 00000000004dd078 R15: 0000000000000006 [ 521.933472] ntfs: (device loop5): read_ntfs_boot_sector(): Could not find a valid backup boot sector. [ 521.957420] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. 21:03:38 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:38 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x200000, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000240)={0x0, 0x7, 0x3, 0x2, 0x600, 0x429}, &(0x7f0000000280)=0x14) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r3, 0x0, 0x401}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r4) r6 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x4, 0x10000) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000100)={0x3, &(0x7f00000000c0)=[{}, {}, {0x0}]}) ioctl$DRM_IOCTL_LOCK(r6, 0x4008642a, &(0x7f0000000200)={r7, 0x20}) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r5, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:38 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x586, 0x200c00) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x34, r2, 0x300, 0x70bd2d, 0x25dfdbfc, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x14, 0x1ff, @udp='udp:syz0\x00'}}}, ["", "", "", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x4000) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:38 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x6000000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 522.170446] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 522.203256] ntfs: (device loop5): read_ntfs_boot_sector(): Could not find a valid backup boot sector. [ 522.232369] net_ratelimit: 21 callbacks suppressed [ 522.232377] protocol 88fb is buggy, dev hsr_slave_0 [ 522.235694] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. [ 522.237403] protocol 88fb is buggy, dev hsr_slave_1 21:03:38 executing program 4 (fault-call:9 fault-nth:2): socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:38 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0xc000000}, 0x0) 21:03:38 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000080), 0x4) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:38 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x7000000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:38 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000140)=r1, 0x4) getsockname$netlink(r0, &(0x7f00000001c0), &(0x7f0000000100)=0xc) sendmsg$tipc(r3, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) setsockopt$RDS_FREE_MR(r3, 0x114, 0x3, &(0x7f0000000080)={{0x8000, 0x686}, 0x65}, 0x10) [ 522.312334] protocol 88fb is buggy, dev hsr_slave_0 [ 522.317703] protocol 88fb is buggy, dev hsr_slave_1 21:03:39 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x8000000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:39 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x5, 0xa, 0x0, &(0x7f0000000080)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x8, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x5}, @in={0x2, 0x4e24, @loopback}, @in6={0xa, 0x4e23, 0x2, @empty, 0x3}], 0x48) close(r1) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x4) sendmsg$tipc(r2, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) [ 522.355063] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 522.392087] FAULT_INJECTION: forcing a failure. [ 522.392087] name failslab, interval 1, probability 0, space 0, times 0 21:03:39 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x3000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:39 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000080)=""/139, &(0x7f0000000200)=0x8b) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x3, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x6f4, [], 0x0, 0xffffffffffffff9c, 0xfffffffffffffffc, 0xce2}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) [ 522.457616] CPU: 1 PID: 28048 Comm: syz-executor.4 Not tainted 4.19.68 #42 [ 522.471034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 522.481402] Call Trace: [ 522.484010] dump_stack+0x172/0x1f0 [ 522.487660] should_fail.cold+0xa/0x1b [ 522.491582] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 522.496700] ? lock_downgrade+0x810/0x810 [ 522.500868] __should_failslab+0x121/0x190 21:03:39 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000000c0)={0x4, &(0x7f0000000080)=[{}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_DMA(r0, 0xc0406429, &(0x7f00000002c0)={r3, 0x6, &(0x7f0000000100)=[0x5, 0x7, 0x7, 0x100, 0x3, 0x9], &(0x7f0000000200)=[0x0, 0x3ff, 0x2a2, 0x20, 0x6], 0x24, 0x5, 0x5, &(0x7f0000000240)=[0x4, 0x7fffffff, 0x9b7, 0x10000, 0x43], &(0x7f0000000280)=[0x6, 0x3, 0x80, 0x0]}) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r5) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r6, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) [ 522.505124] should_failslab+0x9/0x14 [ 522.509040] kmem_cache_alloc_node+0x26c/0x710 [ 522.513663] ? __lock_acquire+0x6ee/0x49c0 [ 522.517918] __alloc_skb+0xd5/0x5f0 [ 522.521573] ? skb_scrub_packet+0x490/0x490 [ 522.525910] ? mark_held_locks+0x100/0x100 [ 522.530151] ? __save_stack_trace+0x99/0x100 [ 522.534579] tipc_buf_acquire+0x2f/0x100 [ 522.538654] tipc_msg_build+0x113/0x1240 [ 522.542731] ? find_held_lock+0x35/0x130 [ 522.546895] ? tipc_bcast_get_mtu+0x163/0x2d0 [ 522.551508] ? tipc_msg_assemble+0x540/0x540 21:03:39 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) r3 = shmat(0x0, &(0x7f0000ff2000/0xd000)=nil, 0x4000) shmdt(r3) close(r1) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000080)={0xfffffffffffffffe, 0x7a, "26505b482d27475db0dfaedbc16797884991303ef5c699122c4c88cb5b535427aa25be938b305d2a831088fbb8be0dc6d4c71f085d998d40f57155ba81ee242c233fe923288a320832cb4d6698102958f036931d23ee39a2680bc4e7ec5c7176b7fde78718dc9d070fb72f408f9a60d7a62d2e11383f5855a706"}) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r7 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r7, 0xc0a85322, &(0x7f0000000200)) close(r5) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r6, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) [ 522.555933] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 522.561484] ? tipc_group_bc_cong+0x160/0x2e0 [ 522.566004] ? __lockdep_init_map+0x10c/0x5b0 [ 522.570525] tipc_send_group_bcast+0x7d1/0xb10 [ 522.575145] ? tipc_sk_sock_err.isra.0+0x2f0/0x2f0 [ 522.580082] ? mark_held_locks+0xb1/0x100 [ 522.584243] ? do_wait_intr_irq+0x2b0/0x2b0 [ 522.588579] ? lockdep_hardirqs_on+0x415/0x5d0 [ 522.593192] ? tipc_dest_list_purge+0x161/0x210 [ 522.597967] __tipc_sendmsg+0x508/0x1500 [ 522.602047] ? tipc_sendmcast+0xc70/0xc70 [ 522.606254] ? lock_downgrade+0x810/0x810 [ 522.609116] Unknown ioctl -1062710494 [ 522.610417] ? __lock_acquire+0x6ee/0x49c0 [ 522.610434] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 522.610451] ? avc_has_perm+0x404/0x610 [ 522.624956] Unknown ioctl -1062710494 [ 522.628870] ? __lockdep_init_map+0x10c/0x5b0 [ 522.628895] __tipc_sendstream+0x831/0xaa0 [ 522.641795] ? lock_sock_nested+0xac/0x120 [ 522.646126] ? tipc_sendmsg+0x80/0x80 [ 522.649941] ? mark_held_locks+0xb1/0x100 21:03:39 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) fcntl$getflags(r1, 0x3) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) [ 522.654102] ? __local_bh_enable_ip+0x15a/0x270 [ 522.658798] ? lock_sock_nested+0xe2/0x120 [ 522.663260] ? __local_bh_enable_ip+0x15a/0x270 [ 522.668037] ? __local_bh_enable_ip+0x15a/0x270 [ 522.672904] tipc_sendstream+0x53/0x80 [ 522.677059] tipc_send_packet+0x41/0x60 [ 522.681045] ? tipc_sendstream+0x80/0x80 [ 522.685120] sock_sendmsg+0xd7/0x130 [ 522.688859] ___sys_sendmsg+0x803/0x920 [ 522.692852] ? copy_msghdr_from_user+0x430/0x430 [ 522.697714] ? lock_downgrade+0x810/0x810 [ 522.702246] ? kasan_check_read+0x11/0x20 [ 522.706409] ? __fget+0x367/0x540 [ 522.709875] ? iterate_fd+0x360/0x360 [ 522.713690] ? __fget_light+0x1a9/0x230 [ 522.717760] ? __fdget+0x1b/0x20 [ 522.721128] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 522.726684] __sys_sendmsg+0x105/0x1d0 [ 522.730578] ? __ia32_sys_shutdown+0x80/0x80 [ 522.735095] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 522.739857] ? do_syscall_64+0x26/0x620 [ 522.744084] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 522.749811] ? do_syscall_64+0x26/0x620 [ 522.753806] __x64_sys_sendmsg+0x78/0xb0 [ 522.757897] do_syscall_64+0xfd/0x620 [ 522.761717] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 522.766902] RIP: 0033:0x459879 [ 522.770093] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 522.789703] RSP: 002b:00007fa00495fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 522.797493] RAX: ffffffffffffffda RBX: 00007fa00495fc90 RCX: 0000000000459879 21:03:39 executing program 4 (fault-call:9 fault-nth:3): socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:39 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) r2 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x2) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r2, 0xc0bc5310, &(0x7f0000000380)) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) getpeername$netlink(r1, &(0x7f00000000c0), &(0x7f0000000100)=0xc) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r5, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:39 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)=0x0) waitid(0x2, r4, &(0x7f00000000c0), 0x4, &(0x7f00000001c0)) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000280), 0xffac) sendmsg$tipc(r3, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:39 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x17c0e45e}, 0x0) 21:03:39 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x8060000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 522.804851] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000007 [ 522.812104] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 522.819372] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa0049606d4 [ 522.826635] R13: 00000000004c7802 R14: 00000000004dd078 R15: 0000000000000006 [ 522.977815] FAULT_INJECTION: forcing a failure. [ 522.977815] name failslab, interval 1, probability 0, space 0, times 0 [ 523.032514] CPU: 0 PID: 28094 Comm: syz-executor.4 Not tainted 4.19.68 #42 [ 523.039595] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 523.049131] Call Trace: [ 523.051739] dump_stack+0x172/0x1f0 [ 523.055390] should_fail.cold+0xa/0x1b [ 523.059385] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 523.064688] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 523.070251] ? should_fail+0x14d/0x85c [ 523.074154] __should_failslab+0x121/0x190 [ 523.074173] should_failslab+0x9/0x14 [ 523.074187] kmem_cache_alloc_node_trace+0x5a/0x720 [ 523.074205] ? __alloc_skb+0xd5/0x5f0 [ 523.074225] __kmalloc_node_track_caller+0x3d/0x80 [ 523.096109] __kmalloc_reserve.isra.0+0x40/0xf0 [ 523.100813] __alloc_skb+0x10b/0x5f0 [ 523.100832] ? skb_scrub_packet+0x490/0x490 [ 523.100849] ? tipc_group_proto_xmit+0x21c/0xa60 [ 523.113631] tipc_buf_acquire+0x2f/0x100 [ 523.117711] tipc_msg_create+0x38/0x270 [ 523.121716] tipc_group_proto_xmit+0x2bb/0xa60 [ 523.126496] tipc_group_cong+0x45f/0x560 21:03:39 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r1) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x20000, 0x0) ioctl$UI_SET_SWBIT(r3, 0x4004556d, 0x1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r2, &(0x7f00000000c0)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:39 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0xb000000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:39 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x4000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:39 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0xd000000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:39 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x3c24ff8f}, 0x0) 21:03:39 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)=0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) rt_tgsigqueueinfo(r4, r5, 0x19, &(0x7f0000000200)={0x11, 0x800000000000, 0xffffffff}) ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x23e) sendmsg$tipc(r3, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000280)={0x0, 0x5, 0x1, 0x4, 0x1, 0x100, 0x8, 0xb60, {0x0, @in={{0x2, 0x4e20, @local}}, 0x7d, 0x0, 0x40, 0x9, 0x3}}, &(0x7f0000000100)=0xb0) r7 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xaf, 0x600000) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000440)=0x1b) getsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000380)=@assoc_value={r6, 0xfff}, &(0x7f00000003c0)=0x8) [ 523.130762] ? tipc_group_update_bc_members+0x200/0x200 [ 523.136149] ? tipc_bcast_get_mtu+0x163/0x2d0 [ 523.141019] tipc_group_bc_cong+0x206/0x2e0 [ 523.146638] ? tipc_group_cong+0x560/0x560 [ 523.151616] ? tipc_link_mtu+0xd/0x50 [ 523.155704] tipc_send_group_bcast+0x3ec/0xb10 [ 523.160314] ? tipc_sk_sock_err.isra.0+0x2f0/0x2f0 [ 523.165351] ? mark_held_locks+0xb1/0x100 [ 523.169691] ? do_wait_intr_irq+0x2b0/0x2b0 [ 523.174111] ? lockdep_hardirqs_on+0x415/0x5d0 [ 523.178819] ? trace_hardirqs_on+0x67/0x220 [ 523.183335] ? tipc_dest_list_purge+0x13b/0x210 [ 523.188401] ? tipc_dest_list_purge+0x161/0x210 [ 523.193302] __tipc_sendmsg+0x508/0x1500 [ 523.197907] ? tipc_sendmcast+0xc70/0xc70 [ 523.202686] ? lock_downgrade+0x810/0x810 [ 523.206853] ? __lock_acquire+0x6ee/0x49c0 [ 523.211220] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 523.217814] ? avc_has_perm+0x404/0x610 [ 523.221815] ? __lockdep_init_map+0x10c/0x5b0 21:03:39 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$vsock_dgram(r1, &(0x7f0000000080)={0x28, 0x0, 0x0, @reserved}, 0x10) r3 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x3, 0x2) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/policy\x00', 0x0, 0x0) write$P9_RREMOVE(r3, &(0x7f0000000100)={0x7, 0x7b, 0x1}, 0x7) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r5, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) [ 523.226947] __tipc_sendstream+0x831/0xaa0 [ 523.234757] ? lock_sock_nested+0xac/0x120 [ 523.239895] ? tipc_sendmsg+0x80/0x80 [ 523.244937] ? mark_held_locks+0xb1/0x100 [ 523.249810] ? __local_bh_enable_ip+0x15a/0x270 [ 523.254684] ? lock_sock_nested+0xe2/0x120 [ 523.258935] ? __local_bh_enable_ip+0x15a/0x270 [ 523.263619] ? __local_bh_enable_ip+0x15a/0x270 [ 523.268300] tipc_sendstream+0x53/0x80 [ 523.272189] tipc_send_packet+0x41/0x60 [ 523.272202] ? tipc_sendstream+0x80/0x80 [ 523.272217] sock_sendmsg+0xd7/0x130 [ 523.272234] ___sys_sendmsg+0x803/0x920 [ 523.272250] ? copy_msghdr_from_user+0x430/0x430 [ 523.272270] ? lock_downgrade+0x810/0x810 [ 523.272289] ? kasan_check_read+0x11/0x20 [ 523.280485] ? __fget+0x367/0x540 [ 523.280505] ? iterate_fd+0x360/0x360 [ 523.280529] ? __fget_light+0x1a9/0x230 [ 523.280545] ? __fdget+0x1b/0x20 [ 523.308589] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 523.321564] __sys_sendmsg+0x105/0x1d0 [ 523.325470] ? __ia32_sys_shutdown+0x80/0x80 [ 523.329900] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 523.334758] ? do_syscall_64+0x26/0x620 [ 523.338736] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 523.338753] ? do_syscall_64+0x26/0x620 [ 523.338774] __x64_sys_sendmsg+0x78/0xb0 [ 523.338790] do_syscall_64+0xfd/0x620 [ 523.355956] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 523.361155] RIP: 0033:0x459879 [ 523.364352] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 523.383258] RSP: 002b:00007fa00495fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 523.390981] RAX: ffffffffffffffda RBX: 00007fa00495fc90 RCX: 0000000000459879 [ 523.398264] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000007 [ 523.405554] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 523.412832] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa0049606d4 [ 523.420287] R13: 00000000004c7802 R14: 00000000004dd078 R15: 0000000000000006 [ 523.428022] protocol 88fb is buggy, dev hsr_slave_0 [ 523.433335] protocol 88fb is buggy, dev hsr_slave_1 21:03:40 executing program 4 (fault-call:9 fault-nth:4): socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x200000, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000200)={'broute\x00', 0x0, 0x0, 0x0, [], 0xab, &(0x7f0000000100)=[{}]}, 0x78) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f00000000c0)={0x100, 0x6, 0x2c710733, 0x3, 0x5, 0x800, 0x4, 0x4, 0x81, 0x7fffffff, 0x400}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4000400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:40 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x10000000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:40 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) pwritev(r2, &(0x7f00000002c0)=[{&(0x7f00000001c0)="26834444888f49ff29420c5f3183feaeed75d4445e7bdf96a248df10757a34c2eb9ff0990c182ce8036f502729dcfc94dbaf26a3928db22f15e832e2f321d4e8168fa2cc6257949c984503bde050330a4feb245fc9e34b89444680025630adeeda9af9d8349b5656e43c9dc7e20a7ce6f675451d8e3c878375b1c16a50c319e7ce3e83de1b0f2838547e55bbf66effa0dd475737903986780141a95c86b581e8a1ec73ef8fabb871feee2ce91ae1a57b90434fd0194c0d7e06477444277863f06d8a40", 0xc3}, {&(0x7f0000000100)="5503471852adc255603f51e8b63ae22eb491cc0472dc198159d7f88e7698b44a736e6e335a8f352f7d6b75a0304e8b575eecb5957a5b870070d930fdadec852c29", 0x41}], 0x2, 0x0) openat$cgroup_int(r3, &(0x7f00000000c0)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) sendmsg$tipc(r2, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:40 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x5ee4c017}, 0x0) 21:03:40 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x5000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) setsockopt$XDP_UMEM_REG(r4, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000080)=""/90, 0x110e000, 0x1000, 0x1f}, 0x18) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) [ 523.592338] protocol 88fb is buggy, dev hsr_slave_0 [ 523.592356] protocol 88fb is buggy, dev hsr_slave_0 [ 523.597449] protocol 88fb is buggy, dev hsr_slave_1 [ 523.602483] protocol 88fb is buggy, dev hsr_slave_1 21:03:40 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x86e, 0x10000) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x80000, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400203) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x6, 0xfffffffffffffffd, 0x100, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) munlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) r5 = dup(r0) ioctl$TIOCGWINSZ(r5, 0x5413, &(0x7f0000000080)) close(r3) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000280)={0x4, 0x4, 0xa4d6}) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) getsockopt$sock_int(r5, 0x1, 0x6, &(0x7f00000000c0), &(0x7f0000000140)=0x4) 21:03:40 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x14000000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 523.661960] FAULT_INJECTION: forcing a failure. [ 523.661960] name failslab, interval 1, probability 0, space 0, times 0 [ 523.733488] CPU: 1 PID: 28138 Comm: syz-executor.4 Not tainted 4.19.68 #42 [ 523.740564] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 523.750537] Call Trace: [ 523.753315] dump_stack+0x172/0x1f0 [ 523.756955] should_fail.cold+0xa/0x1b [ 523.760858] ? save_stack+0xa9/0xd0 [ 523.764505] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 523.769622] ? __kmalloc_reserve.isra.0+0x40/0xf0 [ 523.774479] ? __alloc_skb+0x10b/0x5f0 [ 523.778379] ? tipc_buf_acquire+0x2f/0x100 [ 523.782622] ? tipc_msg_build+0x113/0x1240 [ 523.786862] ? tipc_send_group_bcast+0x7d1/0xb10 [ 523.791631] ? __tipc_sendmsg+0x508/0x1500 [ 523.795873] ? __tipc_sendstream+0x831/0xaa0 [ 523.800279] ? tipc_sendstream+0x53/0x80 [ 523.804352] __should_failslab+0x121/0x190 [ 523.808593] should_failslab+0x9/0x14 [ 523.812404] kmem_cache_alloc_node+0x56/0x710 [ 523.816914] __alloc_skb+0xd5/0x5f0 [ 523.820551] ? skb_scrub_packet+0x490/0x490 [ 523.824888] ? __kmalloc_node_track_caller+0x3d/0x80 [ 523.829992] ? rcu_read_lock_sched_held+0x110/0x130 [ 523.835015] __pskb_copy_fclone+0x110/0xcd0 [ 523.839353] ? __might_fault+0x12b/0x1e0 [ 523.843431] tipc_msg_reassemble+0x3a2/0x570 [ 523.847839] ? tipc_msg_build+0x1240/0x1240 [ 523.852345] tipc_mcast_xmit+0x7aa/0xb40 [ 523.856412] ? tipc_bcast_dec_bearer_dst_cnt+0x850/0x850 [ 523.861883] ? __lockdep_init_map+0x10c/0x5b0 [ 523.866406] tipc_send_group_bcast+0x810/0xb10 [ 523.871114] ? tipc_sk_sock_err.isra.0+0x2f0/0x2f0 [ 523.876057] ? mark_held_locks+0xb1/0x100 [ 523.880215] ? do_wait_intr_irq+0x2b0/0x2b0 [ 523.884540] ? lockdep_hardirqs_on+0x415/0x5d0 [ 523.889158] ? tipc_dest_list_purge+0x161/0x210 [ 523.893854] __tipc_sendmsg+0x508/0x1500 [ 523.897933] ? tipc_sendmcast+0xc70/0xc70 [ 523.902097] ? lock_downgrade+0x810/0x810 [ 523.906282] ? __lock_acquire+0x6ee/0x49c0 [ 523.910625] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 523.916172] ? avc_has_perm+0x404/0x610 [ 523.920159] ? __lockdep_init_map+0x10c/0x5b0 [ 523.924685] __tipc_sendstream+0x831/0xaa0 [ 523.928933] ? lock_sock_nested+0xac/0x120 21:03:40 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x8fff243c}, 0x0) 21:03:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r6 = fcntl$dupfd(r5, 0x406, r1) ioctl$TCSBRKP(r6, 0x5425, 0x6) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) vmsplice(r3, &(0x7f00000002c0)=[{&(0x7f0000000080)="19dfb36a5940b57128b478efdc9e46efd1845472f0c8fb3d3d07c63aed1c4c042c01e9a98f672856b44bcc16a57acee6568ea9867210c0a47b48c63823bd40c65eafd54189", 0x45}, {&(0x7f0000000200)="f4445eb1d5975db4701111cfb620fbe6a632d377f219b0203fc7a548a250f7e5be805a9df26e128cca4d6ce250318292db5ab1f301e19a9fd4cd8d7661d601fe7127918429dc9a23cea1847dfc6dc16d2231c681d52128992aab1b22f56c0c98ffb6a659b2ad82057e65a0811a35ca8d4a93e96b22ebe3de6cd88cbad3b930a62de34ddd282074f3f6fccdf42eb16ca10d", 0x91}, {&(0x7f0000000380)="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", 0x1000}, {&(0x7f0000001380)="6c870bd38ea09c8ef60dfc53b534650a0ccc40bc34d9d2228a39f2092580078ce5944c1a093e80bcb9bb45d05e903fca0a6290d172e693f29fee8e29126c49df173fa6c634d054d9e07e66967b8211081d10cecd1abc848fe696da0a7439c2a93431c124a25486110fe2c0f2861b8868e05237ddeabedf60a37f310d3e67d7d0e6c48f6d7edcc519053216e08013af9485608543dbbead2a4a3394ce330b4fbb4bd3358877585497d9f968f0a10add6620", 0xb1}, {&(0x7f0000001440)="bd0e47ee32438c3b2855132c98b4813c3591e1d7b83611e324567538edd06e4fb4aec58106d7b7cf2c52efdd4a1d7485ed2c2293df89e816e4da9ad5f4a6be3344fd5884395efe0cc9b99b6d03a4fbb62f0b72054030fca6bf26e03473df54bb50029aa6ec0a60ebdb8d15d65592f2768bead5151ff8cc950fb42417abae326cf141d8724f19a04c587c393b093ee7543b46c115204d83e3", 0x98}], 0x5, 0x2) sendmsg$tipc(r5, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:40 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r2, &(0x7f0000000000)={&(0x7f0000000040), 0xf, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0) accept$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f00000001c0)={@ll={0x11, 0xfd, r3, 0x1, 0x9}, {&(0x7f0000000100)=""/53, 0x35}, &(0x7f0000000140), 0x15}, 0xa0) [ 523.933435] ? tipc_sendmsg+0x80/0x80 [ 523.937253] ? mark_held_locks+0xb1/0x100 [ 523.941413] ? __local_bh_enable_ip+0x15a/0x270 [ 523.946176] ? lock_sock_nested+0xe2/0x120 [ 523.950424] ? __local_bh_enable_ip+0x15a/0x270 [ 523.955119] ? __local_bh_enable_ip+0x15a/0x270 [ 523.959800] tipc_sendstream+0x53/0x80 [ 523.963695] tipc_send_packet+0x41/0x60 [ 523.968115] ? tipc_sendstream+0x80/0x80 [ 523.972181] sock_sendmsg+0xd7/0x130 [ 523.976002] ___sys_sendmsg+0x803/0x920 [ 523.979992] ? copy_msghdr_from_user+0x430/0x430 [ 523.985020] ? lock_downgrade+0x810/0x810 [ 523.989444] ? kasan_check_read+0x11/0x20 [ 523.993604] ? __fget+0x367/0x540 [ 523.997064] ? iterate_fd+0x360/0x360 [ 524.000969] ? __fget_light+0x1a9/0x230 [ 524.004957] ? __fdget+0x1b/0x20 [ 524.008329] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 524.013882] __sys_sendmsg+0x105/0x1d0 [ 524.017785] ? __ia32_sys_shutdown+0x80/0x80 [ 524.022215] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 524.027120] ? do_syscall_64+0x26/0x620 [ 524.031105] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 524.036473] ? do_syscall_64+0x26/0x620 [ 524.040477] __x64_sys_sendmsg+0x78/0xb0 [ 524.044632] do_syscall_64+0xfd/0x620 [ 524.044651] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 524.044662] RIP: 0033:0x459879 [ 524.044675] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 524.044681] RSP: 002b:00007fa00495fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 21:03:40 executing program 4 (fault-call:9 fault-nth:5): socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:40 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c, 0x0, 0x4}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000080), 0x4) sendmsg$tipc(r2, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:40 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x18000000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bind$x25(r1, &(0x7f0000000080)={0x9, @remote={[], 0x3}}, 0x12) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x100, 0x0) ioctl$TCXONC(r4, 0x540a, 0x800) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) ioctl$VFIO_SET_IOMMU(r4, 0x3b66, 0x0) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r5, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) [ 524.044694] RAX: ffffffffffffffda RBX: 00007fa00495fc90 RCX: 0000000000459879 [ 524.044702] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000007 [ 524.044713] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 524.053690] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa0049606d4 [ 524.053700] R13: 00000000004c7802 R14: 00000000004dd078 R15: 0000000000000006 21:03:40 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x20000000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:40 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x6000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:40 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0xd0010100}, 0x0) [ 524.186066] FAULT_INJECTION: forcing a failure. [ 524.186066] name failslab, interval 1, probability 0, space 0, times 0 21:03:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) accept$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14) sendmsg(r4, &(0x7f0000000100)={&(0x7f0000000200)=@can={0x1d, r5}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000280)="fa0e702255c9335f4631f5092bce8f44dace96d916ddb4d533143cde74eea22be029559370c1948b0186f595f590ef99b51f86be33f4fc7d939ea791d33256f913c01c5a5a700d493ae4961a202e00499c2e87ffdc8a0268f398992df49a3f642caaad039a644cb1a7460742b57647f9d8e9058b34fe0dd4dc0ad47ea35799bb8187b7be1b7fbdd00a381b6f2ec247086603b179677d784f54073345d8f85057156d8733e1", 0xa5}, {&(0x7f0000000380)="337bed7033ab1101cb13cbfbd3e9a7a7e9d1d6afb47d2dca0ad94f2936b4f3470d13124632e28ce5914b0c38167ca3c076b0928e869afc33fc139ea8bd895627c09ec2fbe6b9c9eb7553a6967c4618a677e76f4d1ae2258c93f20522c7397adbc2237e386ec833f9e9864a997769f6cb13c86d2a9b0ca5477aecb1bb308b16a2a5a263f08d3a70a80398f882e55f9edea8750ce3c11724cf229e366b98cdcaf02352d2ec8f2bb68f5812cce613f5dd11ee359bc5259233407999d54725bdbe75474853ea308e402b6f8d968891b0", 0xce}, {&(0x7f0000000480)="9abc932c8b8c67f2a47f15405815b9830e77c6bf7bc9e9d422d30f3b54bac70ef18c56b6efd76856e9e70dcb64e90516f45b31f64718ffb063d4877585241319405791", 0x43}, {&(0x7f0000000500)="08fd31c6c27cc23065615e36ae8cb7436fb26a648e1cfb5c9b900b5b409b9b5a026ef84640d14e91042d87b93606fd300324b372d5ad6eac03481615e97e00ee02abfdedcd94efff2858", 0x4a}, {&(0x7f0000000580)="69d50a3fe9350d31ad2ef456101e978165b1d94df9e335ee6b511a18ef2471420dc9d7a206a2978b7cd2eb2f21c6ca6f8f2d7d2f806609efdf40034fc57e379b7275b1aee4a35a927f5396d2d79fb2533156d1b19ec83421af46552342e43fc693b5d70e0f10", 0x66}], 0x5, &(0x7f0000000680)=[{0xd0, 0x0, 0xfffffffffffffffb, "2054c5210649253b3c29392fb2241b2441867963b20a3cd6a9582aa04af81575dda9f17c2e7f489ef5aba40bac84b7397496dee9c397cdccdd9eaf2250cb35ab45a95d676febc237cc5921820c08dd9c23f102bcfac08a960d7036dcd9052672c5f669287f0ed9cb66d4ab7b8903e2a4c0062071aebd499ee60c60cd922f56554671ace7531ebb3ddf7e358649959001ba1577f9c1b63c96e8fa2f33fce397a01419395e43e5a075026a2364c963f2966b98061c4c6b0e1191c8"}, {0xb8, 0x3a, 0x2, "4b5514d3f9accde4c1b0285919f28227fd8536f8e67a3634cc517e980144a1e9c621ccf92e59f556d8201b6550bb38e861ac8ba61268ecb00fdbd239fc51fbc1cba3773b7c3894ed74b303487bbdb94c470665e804e4b1351cf1ca48ea46dfbde4fb80d42dfafb2a162f76afa5cdef75d790235d5a8c2b466a313fb8f8b30d6c250f8155431325f29a52de0b611ad240e6f81f27657a6616b4af9795448ec77118fc53d5"}, {0x20, 0xff, 0x8, "47e7ca7963d4c8a0da5761013278db"}], 0x1a8}, 0x4000) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) [ 524.256096] CPU: 0 PID: 28174 Comm: syz-executor.4 Not tainted 4.19.68 #42 [ 524.263355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 524.272894] Call Trace: [ 524.275537] dump_stack+0x172/0x1f0 [ 524.279184] should_fail.cold+0xa/0x1b [ 524.283185] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 524.288311] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 524.293861] ? should_fail+0x14d/0x85c [ 524.297774] __should_failslab+0x121/0x190 [ 524.302026] should_failslab+0x9/0x14 [ 524.305843] kmem_cache_alloc_node_trace+0x5a/0x720 [ 524.310883] ? __alloc_skb+0xd5/0x5f0 [ 524.314711] __kmalloc_node_track_caller+0x3d/0x80 [ 524.319672] __kmalloc_reserve.isra.0+0x40/0xf0 [ 524.324365] __alloc_skb+0x10b/0x5f0 [ 524.328098] ? skb_scrub_packet+0x490/0x490 [ 524.332452] ? __kmalloc_node_track_caller+0x3d/0x80 [ 524.337563] ? rcu_read_lock_sched_held+0x110/0x130 [ 524.342600] __pskb_copy_fclone+0x110/0xcd0 [ 524.346935] ? __might_fault+0x12b/0x1e0 [ 524.351043] tipc_msg_reassemble+0x3a2/0x570 [ 524.355548] ? tipc_msg_build+0x1240/0x1240 [ 524.359902] tipc_mcast_xmit+0x7aa/0xb40 [ 524.364018] ? tipc_bcast_dec_bearer_dst_cnt+0x850/0x850 [ 524.369534] ? __lockdep_init_map+0x10c/0x5b0 [ 524.374054] tipc_send_group_bcast+0x810/0xb10 [ 524.378662] ? tipc_sk_sock_err.isra.0+0x2f0/0x2f0 [ 524.383606] ? mark_held_locks+0xb1/0x100 [ 524.387950] ? do_wait_intr_irq+0x2b0/0x2b0 [ 524.392289] ? lockdep_hardirqs_on+0x415/0x5d0 [ 524.396986] ? tipc_dest_list_purge+0x161/0x210 [ 524.401692] __tipc_sendmsg+0x508/0x1500 [ 524.405963] ? tipc_sendmcast+0xc70/0xc70 [ 524.410131] ? lock_downgrade+0x810/0x810 [ 524.414297] ? __lock_acquire+0x6ee/0x49c0 [ 524.418648] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 524.424278] ? avc_has_perm+0x404/0x610 [ 524.428353] ? __lockdep_init_map+0x10c/0x5b0 [ 524.432885] __tipc_sendstream+0x831/0xaa0 [ 524.437143] ? lock_sock_nested+0xac/0x120 [ 524.441392] ? tipc_sendmsg+0x80/0x80 [ 524.445289] ? mark_held_locks+0xb1/0x100 [ 524.449456] ? __local_bh_enable_ip+0x15a/0x270 [ 524.463011] ? lock_sock_nested+0xe2/0x120 [ 524.467268] ? __local_bh_enable_ip+0x15a/0x270 [ 524.471961] ? __local_bh_enable_ip+0x15a/0x270 [ 524.478137] tipc_sendstream+0x53/0x80 [ 524.482043] tipc_send_packet+0x41/0x60 [ 524.486116] ? tipc_sendstream+0x80/0x80 [ 524.490278] sock_sendmsg+0xd7/0x130 [ 524.494004] ___sys_sendmsg+0x803/0x920 [ 524.494020] ? copy_msghdr_from_user+0x430/0x430 [ 524.494039] ? lock_downgrade+0x810/0x810 [ 524.502930] ? kasan_check_read+0x11/0x20 [ 524.502951] ? __fget+0x367/0x540 [ 524.502971] ? iterate_fd+0x360/0x360 [ 524.502993] ? __fget_light+0x1a9/0x230 [ 524.503006] ? __fdget+0x1b/0x20 [ 524.503023] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 524.531607] __sys_sendmsg+0x105/0x1d0 [ 524.535519] ? __ia32_sys_shutdown+0x80/0x80 [ 524.539962] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 524.544829] ? do_syscall_64+0x26/0x620 [ 524.548816] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 524.554200] ? do_syscall_64+0x26/0x620 [ 524.558196] __x64_sys_sendmsg+0x78/0xb0 [ 524.562277] do_syscall_64+0xfd/0x620 [ 524.566095] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 524.571298] RIP: 0033:0x459879 [ 524.574497] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 524.593767] RSP: 002b:00007fa00495fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 524.593783] RAX: ffffffffffffffda RBX: 00007fa00495fc90 RCX: 0000000000459879 21:03:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x1672, 0x100000000, 0x7, 0x0, 0x6}, &(0x7f00000000c0)=0x14) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000100)={r2, 0x8001}, 0x8) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r5, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:41 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0xeffdffff}, 0x0) 21:03:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000640)='/selinux/enforce\x00', 0x1, 0x0) fsetxattr$trusted_overlay_nlink(r2, &(0x7f00000007c0)='trusted.overlay.nlink\x00', &(0x7f0000000800)={'L+', 0x2}, 0x28, 0x2) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000680)=r2, 0x3) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) pwritev(r0, &(0x7f00000005c0)=[{&(0x7f0000000080)="2187287af9c3c1d641c3e2ce40", 0xd}, {&(0x7f00000000c0)="c4f070f4927535203ffe7e9a352788d7eb7aae1a734fc0503e778dd73dd1f5b2499e6dd7cdfea5be028c5ef21ca4aadb03f4924c4875636a9eff5e5c04e18078fc24c33c26466937c963e9d08f667bf7cfea3a4f644e16a60499ad", 0x5b}, {&(0x7f0000000200)="47604395249787d779819c706a0cfee616c707c380574be91447cd974bbb7225992cb5dff3462f1e5b638eb496c8d9cabbd6cb072a232239297f9b44bb31f5b1caadb83964f8f8ac72bd4b7f630d86e9b14fe2d894b2c40adf84ed64fcb75cf9848cff6311b51f1f100e2878a2e2d0f888038a01a8d6f9001bf4122f2309e3e626ecfcbca7", 0x85}, {&(0x7f00000002c0)="0ba810b18a4e67e3087ffb25d58e043739e41f9ee614e80f4b537fce6e7c98b400a05477492b64d0b3d1703cea32aace0c1d1a6e317a7eccc89cf024d8f20014c4c3ba62dc563b2f68604b50bbba43db0f3787", 0x53}, {&(0x7f0000000380)="ce26a17d91a740e7611b6f0f3882c10f855dfa73fb232149721e2de46efe2f3b4f2768c098b8b15b1b5e7d709c5a72ce98aed503982cf7d1222deae16d4c7f46df37e368c2c98f24ce87664ddcba0cffbebba157e602", 0x56}, {&(0x7f0000000400)="17224015c3d1879321b502b688ec26a3f666247ac55beba7a456979c2e10f51c5606ffe892ea954d3fe2645d4efea3331a4ef3a9e0fe4f96685a9f5f3f4a09d546848b753e2d5279653d16cbfb1aa42acf43350ff92cbf5eb2f66dd4c6350ad09ef4e5ff71b3bcc6422e0329e95311a1ab87eebf8630aaee2f6451fdc502cb55db8257c02a3f65174568b2bd4c7560b7917004644b4bf12da5d21b1b6dec53314251cad17fc6dcbbf9246dc4", 0xac}, {&(0x7f00000004c0)="5540ee4e500a3df94ddc34c305b92139ab22f2b0d31a5101c19db8bf646b18b4bea73f6ce2ec996562d7fe543b46d325abdcaebbe72932af9f8e611fa10604c4cfc8ecec6ecb3f9ceb8913e65c5516d89a32f2044c3a1710e03e339d7ba93f4d40154feca3fe9460ee0f1885edf1d85175ba9c6bbe2843a470ef059a2dc1c597cc95d7a270539fe87c6306e927dea64a8c47621b8bf59b71753095107f5385792830aa133f0b07061d", 0xa9}, {&(0x7f0000000580)="1ef61f3cde534edf", 0x8}], 0x8, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r5, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000006c0)={0x0}, &(0x7f0000000700)=0xc) bind(r0, &(0x7f0000000740)=@can={0x1d, r6}, 0x80) 21:03:41 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0xfffffdef}, 0x0) [ 524.593790] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000007 [ 524.593797] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 524.593810] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa0049606d4 [ 524.616340] R13: 00000000004c7802 R14: 00000000004dd078 R15: 0000000000000006 21:03:41 executing program 4 (fault-call:9 fault-nth:6): socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) ioctl$PPPIOCGMRU(r4, 0x80047453, &(0x7f0000000080)) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:41 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0xffffff7f}, 0x0) 21:03:41 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x26000000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:41 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r1) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x2000, 0x0) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f00000000c0)={0x1ff, 0x3, 0x1}) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r2, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:41 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x7000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:41 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x28000000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:41 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0) 21:03:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r3, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) [ 524.848425] FAULT_INJECTION: forcing a failure. [ 524.848425] name failslab, interval 1, probability 0, space 0, times 0 [ 524.859805] CPU: 1 PID: 28229 Comm: syz-executor.4 Not tainted 4.19.68 #42 [ 524.867385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 524.876751] Call Trace: [ 524.879357] dump_stack+0x172/0x1f0 [ 524.883101] should_fail.cold+0xa/0x1b [ 524.886998] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 524.892123] ? tipc_service_find+0x16a/0x3d0 21:03:41 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000100)={0x1, r2}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x0, 0x9, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, [], 0x0, 0xffffffffffffff9c, 0x2, 0xffffffffffffffff}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) ioctl$PPPIOCSMRU(r3, 0x40047452, &(0x7f0000000140)=0x7fff) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x80, 0x0) ioctl$VIDIOC_CREATE_BUFS(r5, 0xc100565c, &(0x7f0000000200)={0x3, 0x6, 0x3, {0x5, @vbi={0x1a, 0x3, 0x6, 0x34565559, [0x3, 0x2], [0xff, 0x5], 0x1}}}) 21:03:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) keyctl$join(0x1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) [ 524.896551] ? find_held_lock+0x35/0x130 [ 524.900630] __should_failslab+0x121/0x190 [ 524.904966] should_failslab+0x9/0x14 [ 524.909053] kmem_cache_alloc_trace+0x4b/0x760 [ 524.913647] ? lock_acquire+0x16f/0x3f0 [ 524.917648] tipc_dest_push+0x14f/0x320 [ 524.921632] tipc_nametbl_mc_lookup+0x22d/0x3d0 [ 524.926330] tipc_sk_mcast_rcv+0x53e/0x1020 [ 524.930666] ? tipc_sk_rcv+0x19a0/0x19a0 [ 524.934739] ? tipc_msg_reassemble+0x29d/0x570 [ 524.939343] ? tipc_msg_build+0x1240/0x1240 [ 524.943690] tipc_mcast_xmit+0x87f/0xb40 [ 524.947767] ? tipc_bcast_dec_bearer_dst_cnt+0x850/0x850 [ 524.953245] ? __lockdep_init_map+0x10c/0x5b0 [ 524.958546] tipc_send_group_bcast+0x810/0xb10 [ 524.963156] ? tipc_sk_sock_err.isra.0+0x2f0/0x2f0 [ 524.968102] ? mark_held_locks+0xb1/0x100 [ 524.972264] ? do_wait_intr_irq+0x2b0/0x2b0 [ 524.976594] ? lockdep_hardirqs_on+0x415/0x5d0 [ 524.981372] ? tipc_dest_list_purge+0x161/0x210 [ 524.986052] __tipc_sendmsg+0x508/0x1500 [ 524.990214] ? tipc_sendmcast+0xc70/0xc70 [ 524.994377] ? lock_downgrade+0x810/0x810 21:03:41 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f00000000c0)=0x4) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x227905c0572e4470, 0x0) ioctl$BINDER_THREAD_EXIT(r4, 0x40046208, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r5) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r6, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) [ 524.998538] ? __lock_acquire+0x6ee/0x49c0 [ 525.002790] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 525.008333] ? avc_has_perm+0x404/0x610 [ 525.012318] ? __lockdep_init_map+0x10c/0x5b0 [ 525.016830] __tipc_sendstream+0x831/0xaa0 [ 525.021080] ? lock_sock_nested+0xac/0x120 [ 525.025327] ? tipc_sendmsg+0x80/0x80 [ 525.029135] ? mark_held_locks+0xb1/0x100 [ 525.033303] ? __local_bh_enable_ip+0x15a/0x270 [ 525.037980] ? lock_sock_nested+0xe2/0x120 [ 525.042232] ? __local_bh_enable_ip+0x15a/0x270 [ 525.046916] ? __local_bh_enable_ip+0x15a/0x270 [ 525.051605] tipc_sendstream+0x53/0x80 [ 525.055494] tipc_send_packet+0x41/0x60 [ 525.059482] ? tipc_sendstream+0x80/0x80 [ 525.063562] sock_sendmsg+0xd7/0x130 [ 525.067456] ___sys_sendmsg+0x803/0x920 [ 525.071449] ? copy_msghdr_from_user+0x430/0x430 [ 525.076206] ? lock_downgrade+0x810/0x810 [ 525.080623] ? kasan_check_read+0x11/0x20 [ 525.084776] ? __fget+0x367/0x540 [ 525.088239] ? iterate_fd+0x360/0x360 [ 525.092049] ? __fget_light+0x1a9/0x230 [ 525.096039] ? __fdget+0x1b/0x20 [ 525.099406] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 525.104956] __sys_sendmsg+0x105/0x1d0 [ 525.108867] ? __ia32_sys_shutdown+0x80/0x80 [ 525.113297] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 525.118148] ? do_syscall_64+0x26/0x620 [ 525.122107] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 525.127465] ? do_syscall_64+0x26/0x620 [ 525.131458] __x64_sys_sendmsg+0x78/0xb0 [ 525.135601] do_syscall_64+0xfd/0x620 [ 525.139424] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 525.144605] RIP: 0033:0x459879 [ 525.147803] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 525.167051] RSP: 002b:00007fa00495fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 525.174785] RAX: ffffffffffffffda RBX: 00007fa00495fc90 RCX: 0000000000459879 [ 525.182071] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000007 [ 525.189330] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 21:03:41 executing program 4 (fault-call:9 fault-nth:7): socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x4, &(0x7f00000000c0)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) [ 525.196596] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa0049606d4 [ 525.203861] R13: 00000000004c7802 R14: 00000000004dd078 R15: 0000000000000006 [ 525.357420] FAULT_INJECTION: forcing a failure. [ 525.357420] name failslab, interval 1, probability 0, space 0, times 0 [ 525.368750] CPU: 1 PID: 28256 Comm: syz-executor.4 Not tainted 4.19.68 #42 [ 525.375796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 525.385163] Call Trace: [ 525.387769] dump_stack+0x172/0x1f0 [ 525.391426] should_fail.cold+0xa/0x1b [ 525.395336] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 525.400544] ? __lock_is_held+0xb6/0x140 [ 525.404628] __should_failslab+0x121/0x190 [ 525.409088] should_failslab+0x9/0x14 [ 525.412996] kmem_cache_alloc_trace+0x4b/0x760 [ 525.417589] ? lock_acquire+0x16f/0x3f0 [ 525.421575] tipc_dest_push+0x14f/0x320 [ 525.425566] tipc_nametbl_mc_lookup+0x22d/0x3d0 [ 525.430289] tipc_sk_mcast_rcv+0x53e/0x1020 [ 525.434629] ? tipc_sk_rcv+0x19a0/0x19a0 [ 525.438705] ? tipc_msg_reassemble+0x29d/0x570 [ 525.443295] ? tipc_msg_build+0x1240/0x1240 [ 525.447742] tipc_mcast_xmit+0x87f/0xb40 [ 525.451905] ? tipc_bcast_dec_bearer_dst_cnt+0x850/0x850 21:03:42 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x40000000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:42 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x8000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:42 executing program 0: getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) fsetxattr$security_smack_transmute(r0, &(0x7f0000000000)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000080)='TRUE', 0x4, 0x1) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x2000002, 0x11011, r0, 0x0) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 21:03:42 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getcwd(&(0x7f0000000380)=""/4096, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f00000000c0), &(0x7f0000000100)=0x4) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=@newsa={0x138, 0x10, 0x801, 0x0, 0x0, {{@in, @in6=@mcast1}, {@in, 0xf0ffff, 0x6c}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}]}, 0x138}}, 0x0) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f00000001c0)=0x40, 0x4) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x200000, 0x0) sendmsg$tipc(r3, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) [ 525.457484] ? __lockdep_init_map+0x10c/0x5b0 [ 525.462192] tipc_send_group_bcast+0x810/0xb10 [ 525.466809] ? tipc_sk_sock_err.isra.0+0x2f0/0x2f0 [ 525.471751] ? mark_held_locks+0xb1/0x100 [ 525.475926] ? do_wait_intr_irq+0x2b0/0x2b0 [ 525.480262] ? lockdep_hardirqs_on+0x415/0x5d0 [ 525.484866] ? tipc_dest_list_purge+0x161/0x210 [ 525.489554] __tipc_sendmsg+0x508/0x1500 [ 525.489578] ? tipc_sendmcast+0xc70/0xc70 [ 525.497821] ? lock_downgrade+0x810/0x810 [ 525.502044] ? __lock_acquire+0x6ee/0x49c0 21:03:42 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0) [ 525.506298] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 525.511844] ? avc_has_perm+0x404/0x610 [ 525.515837] ? __lockdep_init_map+0x10c/0x5b0 [ 525.520533] __tipc_sendstream+0x831/0xaa0 [ 525.524784] ? lock_sock_nested+0xac/0x120 [ 525.529117] ? tipc_sendmsg+0x80/0x80 [ 525.532930] ? mark_held_locks+0xb1/0x100 [ 525.537275] ? __local_bh_enable_ip+0x15a/0x270 [ 525.542044] ? lock_sock_nested+0xe2/0x120 [ 525.546291] ? __local_bh_enable_ip+0x15a/0x270 [ 525.551015] ? __local_bh_enable_ip+0x15a/0x270 [ 525.555794] tipc_sendstream+0x53/0x80 [ 525.555811] tipc_send_packet+0x41/0x60 [ 525.555823] ? tipc_sendstream+0x80/0x80 [ 525.555836] sock_sendmsg+0xd7/0x130 [ 525.555850] ___sys_sendmsg+0x803/0x920 [ 525.563692] ? copy_msghdr_from_user+0x430/0x430 [ 525.563711] ? lock_downgrade+0x810/0x810 [ 525.563729] ? kasan_check_read+0x11/0x20 [ 525.563747] ? __fget+0x367/0x540 [ 525.563766] ? iterate_fd+0x360/0x360 [ 525.595747] ? __fget_light+0x1a9/0x230 [ 525.599913] ? __fdget+0x1b/0x20 [ 525.603292] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 525.608935] __sys_sendmsg+0x105/0x1d0 [ 525.613205] ? __ia32_sys_shutdown+0x80/0x80 [ 525.617642] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 525.622421] ? do_syscall_64+0x26/0x620 [ 525.626408] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 525.631804] ? do_syscall_64+0x26/0x620 [ 525.635798] __x64_sys_sendmsg+0x78/0xb0 [ 525.639880] do_syscall_64+0xfd/0x620 [ 525.644623] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 525.649909] RIP: 0033:0x459879 21:03:42 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x2, 0x400) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400204) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0xcd) ioctl$VIDIOC_G_SELECTION(r2, 0xc040565e, &(0x7f0000000140)={0x5, 0x0, 0x4, {0xff, 0x1, 0x6, 0xfffffffffffffffe}}) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000200)={0x0, 0x0, 0x7, 0x7, 0x18, 0x82, 0x9, 0x4, 0x3, 0x5, 0x5, 0x95f}) ioctl$DRM_IOCTL_FREE_BUFS(r2, 0x4010641a, &(0x7f0000000100)={0x3, &(0x7f00000000c0)=[0x3, 0x0, 0x800]}) [ 525.653118] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 525.672302] RSP: 002b:00007fa00495fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 525.680032] RAX: ffffffffffffffda RBX: 00007fa00495fc90 RCX: 0000000000459879 [ 525.687326] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000007 [ 525.695145] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 525.702456] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa0049606d4 [ 525.702465] R13: 00000000004c7802 R14: 00000000004dd078 R15: 0000000000000006 21:03:42 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x900000000000000}, 0x0) 21:03:42 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x43050000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:42 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x9000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:42 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r3, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:42 executing program 4 (fault-call:9 fault-nth:8): socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:42 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x60000000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:42 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0xc00000000000000}, 0x0) 21:03:42 executing program 0: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r2 = openat$capi20(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/capi20\x00', 0x0, 0x0) dup3(r0, r2, 0x0) 21:03:42 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r2, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000080)=0x4000, 0x4) 21:03:42 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x800e0000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:42 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0xa000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:42 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000600)="804000001009594b85c63c1cbd217c1befb0bb7a37993f6570e7e16ce3ec50bfc5ef8a02d2d09d533bdb902162bd8a34bd99f1433849e30002000015c7903df39cd3cec7fd016a7d19f90d050474571be52defa8b3180d89ea2486a44400000000000000000000000000b60ceceb46f90c68c46c5ad8340b1ce369fbab834d586f066b3038584fbf07d6267527b883f5bd4a9e79005018b93dceb15b0500000000000000cb121a0eac58b8ca3bd80eb2f318d9b248a27fa1eaf833f783226721942a1bc8c9c2c0dc9020854af9fc965fa33e5841", 0xd4}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sched_getparam(r1, &(0x7f0000000000)) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) [ 526.132358] FAULT_INJECTION: forcing a failure. [ 526.132358] name failslab, interval 1, probability 0, space 0, times 0 [ 526.171355] CPU: 0 PID: 28321 Comm: syz-executor.4 Not tainted 4.19.68 #42 [ 526.178522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 526.187889] Call Trace: [ 526.190495] dump_stack+0x172/0x1f0 [ 526.194144] should_fail.cold+0xa/0x1b [ 526.198045] ? kasan_slab_free+0xe/0x10 [ 526.200817] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2320 sclass=netlink_route_socket pig=28331 comm=syz-executor.0 [ 526.202032] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 526.202045] ? __tipc_sendstream+0x831/0xaa0 [ 526.202061] ? tipc_sendstream+0x53/0x80 [ 526.221898] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2320 sclass=netlink_route_socket pig=28333 comm=syz-executor.0 [ 526.223917] ? tipc_send_packet+0x41/0x60 [ 526.223930] ? sock_sendmsg+0xd7/0x130 [ 526.223940] ? ___sys_sendmsg+0x803/0x920 [ 526.223952] ? __sys_sendmsg+0x105/0x1d0 [ 526.223964] ? __x64_sys_sendmsg+0x78/0xb0 [ 526.223978] ? do_syscall_64+0xfd/0x620 [ 526.223998] __should_failslab+0x121/0x190 [ 526.240642] should_failslab+0x9/0x14 [ 526.240658] kmem_cache_alloc_node+0x56/0x710 [ 526.240674] ? lock_downgrade+0x810/0x810 [ 526.240696] __alloc_skb+0xd5/0x5f0 [ 526.240715] ? skb_scrub_packet+0x490/0x490 [ 526.248833] ? kfree+0x170/0x220 [ 526.248850] ? tipc_dest_pop+0x24d/0x300 [ 526.248860] ? kfree+0x170/0x220 [ 526.248878] __pskb_copy_fclone+0x110/0xcd0 [ 526.261477] ? tipc_dest_pop+0x24d/0x300 [ 526.261499] tipc_sk_mcast_rcv+0xbd0/0x1020 [ 526.290241] ? tipc_sk_rcv+0x19a0/0x19a0 [ 526.290259] ? tipc_msg_reassemble+0x29d/0x570 [ 526.323037] ? tipc_msg_build+0x1240/0x1240 [ 526.327357] tipc_mcast_xmit+0x87f/0xb40 [ 526.331849] ? tipc_bcast_dec_bearer_dst_cnt+0x850/0x850 [ 526.337314] ? __lockdep_init_map+0x10c/0x5b0 [ 526.341896] tipc_send_group_bcast+0x810/0xb10 [ 526.346477] ? tipc_sk_sock_err.isra.0+0x2f0/0x2f0 [ 526.351392] ? mark_held_locks+0xb1/0x100 [ 526.355621] ? do_wait_intr_irq+0x2b0/0x2b0 [ 526.359939] ? lockdep_hardirqs_on+0x415/0x5d0 [ 526.364531] ? tipc_dest_list_purge+0x161/0x210 [ 526.369294] __tipc_sendmsg+0x508/0x1500 [ 526.373370] ? tipc_sendmcast+0xc70/0xc70 [ 526.377514] ? lock_downgrade+0x810/0x810 [ 526.381653] ? __lock_acquire+0x6ee/0x49c0 [ 526.385887] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 526.391415] ? avc_has_perm+0x404/0x610 [ 526.395386] ? __lockdep_init_map+0x10c/0x5b0 [ 526.399876] __tipc_sendstream+0x831/0xaa0 [ 526.404203] ? lock_sock_nested+0xac/0x120 [ 526.408428] ? tipc_sendmsg+0x80/0x80 [ 526.412302] ? mark_held_locks+0xb1/0x100 [ 526.416459] ? __local_bh_enable_ip+0x15a/0x270 [ 526.421115] ? lock_sock_nested+0xe2/0x120 [ 526.425362] ? __local_bh_enable_ip+0x15a/0x270 [ 526.430035] ? __local_bh_enable_ip+0x15a/0x270 [ 526.434806] tipc_sendstream+0x53/0x80 [ 526.438693] tipc_send_packet+0x41/0x60 [ 526.442663] ? tipc_sendstream+0x80/0x80 [ 526.446731] sock_sendmsg+0xd7/0x130 [ 526.450532] ___sys_sendmsg+0x803/0x920 [ 526.454625] ? copy_msghdr_from_user+0x430/0x430 [ 526.459546] ? lock_downgrade+0x810/0x810 [ 526.463710] ? kasan_check_read+0x11/0x20 [ 526.467849] ? __fget+0x367/0x540 [ 526.471305] ? iterate_fd+0x360/0x360 [ 526.476633] ? __fget_light+0x1a9/0x230 [ 526.480598] ? __fdget+0x1b/0x20 [ 526.483954] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 526.489481] __sys_sendmsg+0x105/0x1d0 [ 526.493357] ? __ia32_sys_shutdown+0x80/0x80 [ 526.497849] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 526.502595] ? do_syscall_64+0x26/0x620 [ 526.506567] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 526.511926] ? do_syscall_64+0x26/0x620 [ 526.515948] __x64_sys_sendmsg+0x78/0xb0 [ 526.520009] do_syscall_64+0xfd/0x620 [ 526.523819] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 526.529004] RIP: 0033:0x459879 [ 526.532275] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 526.551509] RSP: 002b:00007fa00495fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 526.559304] RAX: ffffffffffffffda RBX: 00007fa00495fc90 RCX: 0000000000459879 [ 526.566560] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000007 [ 526.573835] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 21:03:42 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffc, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x8c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f00000001c0)={r1, r2, 0x3ff, 0x61, &(0x7f0000000080)="5bc5d5b89d89b34f945bdb43d2e29b3c202e9f9dcbe7c05960f8d43fa5048557fb9a3fec5af7a66215912dc445531a9372b83f6a7e0dc6ad2fdc3ca4ac34bcc76af88d115ff9ffcadf1e9a8bad5f3da1c4dcba8222336788acee698e7d78689479", 0x5, 0x7f, 0xf76, 0x3, 0x1, 0x1, 0x7, 'syz1\x00'}) sendmsg$tipc(r2, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0) 21:03:43 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x5ee4c01700000000}, 0x0) 21:03:43 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x80350000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 526.581352] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa0049606d4 [ 526.588612] R13: 00000000004c7802 R14: 00000000004dd078 R15: 0000000000000006 [ 526.605933] Failed to clone mcast rcv buffer 21:03:43 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x81000000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 526.636392] __ntfs_error: 32 callbacks suppressed [ 526.636405] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 526.663141] ntfs: (device loop5): read_ntfs_boot_sector(): Could not find a valid backup boot sector. 21:03:43 executing program 4 (fault-call:9 fault-nth:9): socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:43 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r2, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:43 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x8fff243c00000000}, 0x0) [ 526.698383] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. [ 526.775211] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. 21:03:43 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x86ddffff, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:43 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:43 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80007, 0x1, &(0x7f0000000340)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r2, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:43 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x10000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) [ 526.870724] ntfs: (device loop5): read_ntfs_boot_sector(): Could not find a valid backup boot sector. [ 526.888101] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. [ 527.001183] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 527.064755] ntfs: (device loop5): read_ntfs_boot_sector(): Could not find a valid backup boot sector. [ 527.079283] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. [ 527.592346] net_ratelimit: 17 callbacks suppressed [ 527.592354] protocol 88fb is buggy, dev hsr_slave_0 [ 527.602699] protocol 88fb is buggy, dev hsr_slave_1 [ 527.752359] protocol 88fb is buggy, dev hsr_slave_0 [ 527.752391] protocol 88fb is buggy, dev hsr_slave_1 [ 527.757930] protocol 88fb is buggy, dev hsr_slave_1 [ 527.763267] protocol 88fb is buggy, dev hsr_slave_0 [ 527.775245] protocol 88fb is buggy, dev hsr_slave_1 [ 528.712410] protocol 88fb is buggy, dev hsr_slave_0 [ 528.717514] protocol 88fb is buggy, dev hsr_slave_1 [ 528.722340] protocol 88fb is buggy, dev hsr_slave_0 21:03:45 executing program 0: r0 = gettid() nanosleep(&(0x7f0000000000), &(0x7f0000000040)) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x5, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f00000000c0)=0x8000, 0x8) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x10) tkill(r0, 0x20000004) r2 = semget$private(0x0, 0x0, 0x501) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) semtimedop(r2, &(0x7f0000000100)=[{0x3, 0x3, 0x1000}, {0x1, 0xfffffffffffffff7, 0x800}, {0x3, 0x0, 0x1800}, {0x7, 0x4, 0x1000}, {0x1, 0x1f57, 0x800}], 0x5, &(0x7f0000000180)={r3, r4+10000000}) 21:03:45 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0xd001010000000000}, 0x0) 21:03:45 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x88470000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:45 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x2}, 0x10, 0x0}, 0x0) 21:03:45 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) r1 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x280d, 0x480) accept4$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0xffffffff, @host}, 0x10, 0x80000) socketpair(0x1e, 0xa, 0xffffffff, &(0x7f00000000c0)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) getsockname$inet(r1, &(0x7f0000000140)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) sendmsg$tipc(r3, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f0000000240)=[@in6={0xa, 0x4e20, 0x5, @loopback, 0xfffffffffffff800}, @in6={0xa, 0x4e22, 0x100000001, @mcast1, 0x4}, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e22, 0x7, @dev={0xfe, 0x80, [], 0x10}, 0x1000}, @in={0x2, 0x4e20, @rand_addr=0xe5cb}, @in6={0xa, 0x4e20, 0xd71, @rand_addr="35a9dc097449b16a7fa33c8550b95124", 0x3f800000000}], 0x90) syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x3, 0x440000) 21:03:45 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x110e0000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:45 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0xeffdffff00000000}, 0x0) [ 529.238960] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. 21:03:45 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x88480000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:45 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) accept4$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000240)=0x14, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, r1, 0x0, [], r2, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:03:46 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x3}, 0x10, 0x0}, 0x0) 21:03:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000000)="11dca50d6c0bcfe47bf070") r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = openat$usbmon(0xffffffffffffff9c, &(0x7f0000000080)='/dev/usbmon0\x00', 0x420880, 0x0) ioctl$MON_IOCX_GETX(r4, 0x4018920a, &(0x7f00000001c0)={&(0x7f0000000100), &(0x7f0000000140)=""/71, 0x47}) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x82) ioctl$KVM_SET_LAPIC(r5, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x9) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x2) ioctl$KVM_SET_CPUID(r5, 0xc008ae88, &(0x7f0000000a80)={0x1, 0x0, [{0xd90}]}) dup2(r1, r5) 21:03:46 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x1f000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:46 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0xffffff7f00000000}, 0x0) 21:03:46 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x88640000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:46 executing program 1: lstat(&(0x7f0000000200)='./control\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0xee00) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x20, 0x7, &(0x7f0000002440)=[{&(0x7f0000000080)="8e01ef5eac953b4d8e06304a40b2d768ca767db25647071591d41ca975b7fe516fb105a4affa90cef47b2447720ca14e0d130712b18ab25d93073c4ecade2778a9ef12e65a8d7fb39d352a578441c9c87ef2f4b3a154215aaa32dcbeac8258b92ee2d2c03f52b50bc9ed4224337edf0e702249a6e103796a3b7a593e500b5613e0b917a8e69045b9", 0x88, 0xffffffffffffff52}, {&(0x7f0000000240)="a338de750de3863d4071ec4dd2351829ffd23dcf4b3d4481ec10af0f42b71bee502eaf3507c1b8d80728104bd8805e3f083b5bc2eb108a123dd1564cde249c97e75ba6dd7f1c370183e8ad9c5a7e4aec725d089922ae10a403b1e531aa24b768061d40cd24db4c59848e4d4495fb44086d891bd8a77c8d9c322e75af640f81", 0x7f, 0x100000001}, {&(0x7f00000002c0)="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", 0x1000, 0xffffffff}, {&(0x7f00000012c0)="e4a1ab6be55981809593248d0e979b5eda1b33858def55c6851a6ab7e18b6a1e833d240a25e412ba1561a375eccb2806d64d9d14a9821ce13c565a95e5358ec09b17dab8b83d9e2b0d5495f3a58a75cd3c6c40ce44aea2add4f336b6ca3e44b059071301fbb08ce3bb666137d166d289a80f346c75cfe70fc961b35ba31f7ccc069681d857d4262410fe1ee81a2a00221c863cf8460f9ea16be9ae3d917720ec3f75deb1b99e8c796773ad38f99fadba4d2324e8fc5f416c9c1c25f89744440dbd3dd8bf40f6d7c77c76735d3598c4b264f7468b481f2f923ee52df13d7614565d596ed6221f5c02860516e9bcac3a0db406ef98aaa1bbc61d8ce93cbecf9507de3206983339fc918e09e28a7332d1c160bc9341ce5757e95fbfac1aba3b4c4051a210a22cfc9d1108fd89f7a48e7f4828375f10d25e084b29d53e94e6b300f90ba7a37f181a45e542f1a934bd68b8781f02514789e66203f389000c0ec204cf4befb9f8f1fc1bcc0d0949119478d287d4c3e99b8a6f266258fccd0bae1b4796b7f72244b34e8133a21510c63b88efd2c3df71d6bd917af4c3bd9bc0993e38c589059fd4b302329a1ccad95f1a5a703a6e0dcb62b9028d51ab0d5658d172b685fd412089194983bf63e47b7a545f6931189de7f194e92011bc9ea6d630962637e48d49775658f93bae4951bb95e2c3dc44911c43745b0324d1725c3d14aaf619e95d48a9f28fc89ae717f2e5d1d18e065bfd0419c5411e970e83d80d7dcbaa592b7500c2157625f5f793ccd26a6b6158c8a69b5892a5e6ee5e8def2ec470e3de9e1d5e5739c24c97c302e96cdc45269c5d226f975e068f3634df0b5a5931839c1acb6e37a00b66f89717170fa4aa20deea7e7447e846c3a0e777c02a9cff9655c4f8ce0e809d293bc3fb72b9d7d7221ee3550cccc7d030bd89fcabf5fcca498be99e9729135bbd884859b0404b0f0c7532cad4e48255af078d5280a39d5e0bc941810fc61346e649b70d4428bfa4fb5e9531ae955801584c2117401e9ad02c70c799753ec5bb0d3010db86c00030b842bd20868f86f5fa65245c86e332b5cf02512243d6e200d56a987eab56dcc265433c0d46440933fc65b70c108a2a15df4c4434bd440f9d089a0d81e00ea6427e0e50710149e1450863da25840a497ec1beb2367cbe77eea76cf47476acdbff7e98e58eb609f9f4896a24ac3ea73c724d04cf63baa2d05a971e3f17697e8d2bf3e459ae0d3c8ef7f4c6b74332d24af0eb7281fa21a1448557cb9d706f65b81c47be8d2408a06d88e95311028f586cd7d02dc586d525e70cb572af3330695db442698d3be52110765fb0114966bf024fde5764ecc3c5e09d21bd10d664151c70e6df8d2a1d9a363aa83e458518f343063ab356b77662e4da34fa6231de7ba78aa3f04f386f33d040afd1eeab9b20ff39f641475df53992b98f1730febca13ea3ef3d101c85fcd86f528178eed77cc8924762855d97608d8cf35f49338764e99346f7e92b25512d2faec539b35710a4cc79629c99e857a1db80b7ac2ce019ed0c5a0650ce7af01a7b1378df50b18b56d21968f62d38a899c18f718117921079ca79a802d37d7fe3eef1a6a11825e74a37841e595a7022b3b3edec5984169d3dab49b3181d52b3462a73b6588d9e33d69cfbe6dcec7c4263ba20ac56fa6e6c9e93742e4f341d332b7643ea52bb8e8a9be0515d35fc72862c776ff6c828580a6a232ec8d6d934ab0ca33e0934d1010115b3c6abd85b399d3760756b3ab73ff0ca65241d0962843d321497bef70e26da45f1158d8fe761838f8dc8f82a9eebe72f0cae280c1b41788e42c01d69b1a259004a6c31bf20e39942bfb80a8ebc169621c4f1dd9433f3f061e6d914768952223516040e915f6aea0c3a60bea0bf7458405c0e378322296f4d9c40a514331013cfbc0fac2993a45cf1efe5abf78aa68e4dbb1555763c7241dc9527477d91a1bc255817bdddbf188d1cec89fe288126cb29c946d58f5aa35168bc17c811de8e5f1bff6afbe994dbcaa1ed97682acf3a7a335434e07592f57536ec24455994a1abdfeb9844910ad6ee8dc2958201bc3a1bb68ec4aa0b4238017e203d2639fbfaa3fa5595b0c2f77a7830636edc79a336b91d5d7253cfe1fca72621b3866dca10abc79a93eaa4de876b4ae88747f12777848e885aa3c8740872faee3dda41915eee360e631315cfe12216b0ffd0f3cec6becae62afa5cdcba1ad3eafefe8fa7b0599c5b7747950a95d7ca95e03c465405f9acd806534601923b2bbb0b4e693cdf7391379e5694785cbc28ddb370a4d0d44eb6bffa20c9af8f7dcb43705e9acf076e20951e9bb30d9c00cecff4707a05f68b506c5000e8021145bdcab1c2b27f92ca98a22be26f78b2452ce873c4f4f1f87c6c7605baca6384f645b56677b8dc5a914c4cbd2a0dad3b8e36c65da65ceba41b7658949a180f89b9dd7f69369a26a385533bac1e057b64ebb46b0c97ab4f98384f4408aecd15abc1a3a41ac76a18d70d5518434e3f4c235f6146cd0981dc37af3f3cc8e21ec111b2e28dd2da037fb21265dfe58f9f3afb34e969e406029a9bc81265d73aec497aedc555b934a2f5cfdb7190920256967af27a495638b6ce977abfc17880a91947c7ec6253d74a6c2e4aeac266953aa88422c8f3b336ed55230f804060aa72d6f1ebffe8fa1d21462ad49923f0ba40ac49d13c844dff1ab06528321272b2cea6fdfee6a7e46bfacc272ba1547be16053ed1d801d89518226d8d326a7daae0599e700e16d8e88f70404c7387b222f4d6fc076e52b615e025f6aa84d62a2336780ef18235d0edb38fea8ca738d15715a309ca6a6667e91b8c0f2cc4e99103c79a8cccca8cc331e763aafb438b93ff242a9df4dae3b0c4596a4920b628af9b8e135c15a4c858c279e2387169ad7805aedf5af9f75770fd3963d9b68a0298af0d1d83c795527901e01fd3d961ea7159a3267c1ab51343133d8d9aeed39e3e362e4523da0132ed0c303c77a5f1552ab1d5f318492b073aa45ffc1f1bcd245662e0a431a7f1006cdf5c74b445a1de353757a54f8079bffb9eeebe804f4bbc31d4c97fbc61cbc3b82dda7ca0a0284aa5907bd637dc893c6e42abf00c6d404a8a8c1e2f28e18d98c6cf38e619a6a0ac5fe6e2761560fdd95de3358cc53bb86339cebdedcec8bb95689fb2d09ce8b3d6bfd55410480bde818ce89e12e89f837c48dfe746b765971572930114a8b8a6f7a7c80b42ceef9b51c90280f6eb61b2a3e730956c79f250215b2c521f036df581fb507661cc4f821aa2ce913433efd6e2f71986a77af8d1edeada9fa39c2eea44d488f6b36c4f0e462be3b6e99368cda2655e2afdd2864506bfb9c4cb0e604057c3223ae07b29fe7e138519f3a76b99bde35cade70e3671f824eadc4b2d4569cb8d40669057703e9f50cd090631456bff51e40bff441be5c55335be3bbc476844dc574e311ed4166127438ac3f45c9c3fc2b0321052b692ae79e2e97ee4ab1976a3de36a6715570b8dc35a48b2701aaa6a707045194c55f7d7b2ff7982a1ecde77eddd9827ae290f0756a4ac9332009eb01ecbfc3f026665cc83c95508592a4cb2a6ed526189f777faa9ab57e91db132492981199b2cd06644a4882d1436ef974d6dc078163d85506374b4248c988341fb521c875535e8562f8664e7bb0eb28a84a0ccc8061d55f39d6f666aec051188b489c23738036cbd188035761d4d6e461a19988c8f2ad7a05cb09140dfbb488fff3513596f61ff257409d675275010901b3922c08e1058de2e56e4eb601b758026a8a6dea57fcc2b79130ececefa32fed48f50a880a093f28e880c3492a8fd5a68b0a9c721b2016f37d677ff269e5a1c6f198a34a597dcddd42c9ef088aa1df6fd98482684e7265ed9838ba68c0c8efefee0eac53d20e854b1c59ee87e765caffcc384d85f446b6592e5fd6fb795b6abf7b8dc2f7907962d49f743c91cdd5dd2f57489e0e0796383e4ed380df153287730b850e36fab09654477fc5481cfbc2234394c9d65a2f7dbda5fa1bef218d6ef3e51942107131d0025b8679270b44576188215373f5f8fad1dce81b0f577758b04353dee2532b9884d4190a32d3978acb9246f602cb42ded5222d28276be136744069c301d6882a9515d1d1ab324bf3f02b4a3996f1b2f378cd8501dad4ebfc2c8b514dca296642feab581a7045bd55854b73f2ed0e5f0feee2ad4bc1a96ae7a8c8c5eb179c099e2a78975b175e03939513af8fb180db75e2b82f150c4de47d6cb03024e9e88d01b6ba913eebae3cb831c3f9fdf06fb7d3d880ca959adf4faaa7570a695c5a0ab7ed9ca913cb48159b3d6fbd9e15be3317dcb778e3114ce74c710d8def0f63885f1473e36ea7d0cfe92e7a1fd6a30c5a3e11844f07ef56dad330f11d2734c8fb2ff317e0c34f0f3b6870d0a4dd3236e78e984ee0e70ec9b01f81c06d576c136d78956c9256acea7aabeb4854fd91af699fd2cd56ea4d91cd1c61a7a9d869db105916106475f1bfaff0fba618df26505beb22fb544d92865af43e0ce7da9b7c50fcca7f2433d23bfd7744b8aed4de00f537caf1f2c9ff573a1ef72ec44ce59a8854daf806bb3786226adb0a0e5ce1278e60dec7efe9c028670557273fa870b71ebe5b4106d516b3a5e6d7f72e2a7cd6bb44a2e7977e1e9ece1a0126de7207f99ee0cc594403b02ab4e635a1f37c748c70fe25450cab7da0f9dc8cd61307f7937c106a96a6817dc32c5726058fe63d81c965f74d2e5c3f60b0afd73d1663a8b181954a6b72d6ef5521da9f794e931b8b8f444e42feec3caa79fae3fe93ac7dab99bc2e1c7b82b4d496df66da5e7b5f024babb778ed616bef61eda760569bf84245bdd75292aef74963e050066180328958ddff103c53a78f2e93e604e8295058206e36b9748b58d6edbc7c6f506bc0946722d9a28a238b4984adba98979137f9998a1bd3fc259d96e1f5a13e14c70838695d86f8202e2718cca6ab34cd103369522376b0998b1c1c1c6730a150c69a33aa977be042d1ba02bfc2722934f843e319a9effb0217c3dbe453557519bb8066f98dc369a505bd1b025dbefb9d0b188e1aab76bc90140981448ee03c65c488c3095ed889bba2df52308907562a69deca837010888c19fa6c28e273c12b06d360855a1604f11da63f0fd931a9e2aafd26336cd0f766ba345235a75aa19cb95aa0c3767396ff8cdf9c2117ecf4c96ddee761601faae785422bd89067c736f99842705742265a81f5d21ca4e16d2d96592db94bf5efd37b52e2f79f748ad21a5037d6c8ad2790734508f67f8ce9b6cc7f3e0d0c8f6bf9371e05e56ff61f96393091896c4772ce49c75aa3439d5b168ea218817f7dfb7e21edc719b85cc413e3608f44852edb0e2c1167005a74287bfc32fb207506a024251da779f48b20fe12f9492ad49bd2b5016efdeadb8219b20f5608cbc475ca14dc8bef85ed67cd487e32a6eef9636696604c6096abb62fd4d67ba78164afdf6ec266754908703580a7308a0f2667b806aaa8c8762a19523332f0624141b36a18a1385b25358b251667276e2458a1ed92e46b2e2ec28d6da9944cd6c13e1d1a286d400be3471d6ceb06efa84d58bd3df716f602dbafcd8e2aefab19d7cac2b4fd49d727acbc1e20004911d871f79ee4cc1025ccddeb9e18274fc5f9e404d528ba4557dbe85d49db6515cecad9c4757cdd65267ff39cd04cab8e7b864f60beea11c5832b4b0349fedb4917faf6808faa4f25a11c6affbd34ed6", 0x1000, 0x1000}, {&(0x7f00000022c0)="30f238cb9d4844c80aa1e0a2790d3bf6e9255249d12b2261c82c336b897f8429850e39c1996e0ca37bf6642cca5f83bf54886312224dd7bd794ca65aa0ce1a27c58d7c74d06f67f1a263efd44f2a118c52637cb31b52dc49a5a23ef2179cfca768d2bcbaf331db399f9f004bb687fd5c", 0x70, 0x4}, {&(0x7f0000000140)="ef54", 0x2}, {&(0x7f0000002340)="5bfbd1efee3323257463599c7c8ccf7cf8094faad47d6b9c173186de13957f1731ef54f60f884fe503073fddfc3c2a388e6f0de5600dafd6f553552eef5aef0626b74388d2ad181f0997057abd4a589e178f3c552034943fd302ae97f6d022f90ff105b54173633c0fbdd9197196c17979fc02c7077952476c146ec606325a20898abdf8a9f5f4d9c22699aa2cf169b6ff97eb0767091037a9da6ad7620c7e1b554024b44234bf2b7a5ff1aa986d1cfad4ba480e7302582e2c93ee43e4ac7d6030f00e2f5361", 0xc6, 0x1695}], 0x8, &(0x7f0000002680)=ANY=[@ANYBLOB="936e695f785994c70552f7e0069f776e060000000000000074ec35d146e774846b89bdb866fde54522c1a4385e", @ANYRESDEC=r0, @ANYBLOB=',obj_user=.cpuset,fscontext=staff_u,fsname=,\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000029c0)='/dev/usbmon#\x00', 0x0, 0x100) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f0000002a00)={0x67, @multicast1, 0x4e22, 0x1, 'wrr\x00', 0x20, 0x9, 0x5b}, 0x2c) r3 = syz_open_dev$media(&(0x7f0000002580)='/dev/media#\x00', 0xb855, 0x2001) ioctl$VIDIOC_DBG_S_REGISTER(r3, 0x4038564f, &(0x7f0000002500)={{0x1, @addr=0x6}, 0x8, 0x7, 0x100000000}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000002540)={0x0, 0x4}, &(0x7f0000002800)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000002900)={r4, @in6={{0xa, 0x4e24, 0x5, @loopback, 0x9}}, 0x2, 0xfff, 0x7, 0x23, 0x34}, 0x98) write$FUSE_CREATE_OPEN(r3, &(0x7f00000025c0)={0xa0, 0x0, 0x5, {{0x4, 0x3, 0x3e1f, 0x3, 0x8, 0x7f, {0x1, 0x7e, 0x8, 0xfffffffffffffffd, 0x6, 0x4, 0xfb98, 0x7, 0x6, 0x2c7c, 0x9, r0, r1, 0x9, 0x3f}}, {0x0, 0x1}}}, 0xa0) ioctl$KVM_RUN(r3, 0xae80, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000002840)={0x80, 0x1f, 0x835bbd582a885da5, 0x1, 0x9169, 0x40, 0x3, 0x3, 0x0}, &(0x7f0000002880)=0x20) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f00000027c0)=ANY=[@ANYRES32=r5, @ANYBLOB="24002a0ad09dd10740583d37844c45677ba39138fabfd8244d"], &(0x7f00000028c0)=0x2) syz_extract_tcp_res(&(0x7f0000002780), 0x800, 0x2) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000002700)={r6, 0x8000}, &(0x7f0000002740)=0x8) setregid(0x0, r1) 21:03:46 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x20000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:46 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x4}, 0x10, 0x0}, 0x0) 21:03:46 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x7, 0x4000) sendmmsg$nfc_llcp(r0, &(0x7f0000000400)=[{&(0x7f00000000c0)={0x27, 0x1, 0x2, 0x5, 0x1c, 0xfffffffffffffffb, "9771377431807204cd0525ee169486ffcff0c381058a0e926f297941801383316af103d2bbb1a4d50b0e0be8a18c848261a881b8dc407e689f553c837dbcdb", 0x2f}, 0x60, &(0x7f0000000380)=[{&(0x7f0000000140)="c7dc78ddd19fd3aa848012d1a13bf4b62bf17f1bd3e77d77e0fd442ddc9299e00f28da7604b1f955dfe750d31f52c7270ea701edb6cdb5115ffede24094c92a3e7a5ac9d1b869dd4b0081aace281946ac4945d2ce2328b8fe081a8509664399cd47c1f04b5f1129c6ac82f75241f30e5fd6971c5ccd6e266bf9e5961d5f164118a42b0261493323d501110d8d5c65c4083a7e9ed7eefc38a15b04a9076a117045efc419f23e7f74ff8d77af196c4315e0c85a8097767e9c4cc6db5692812518c14b1e8a04fa231f058d5fd4924bbd07af6e1abd35c96c449ef988c052138bd5b0b8cf1d35a42fd8c2ba5f3a435e129d13e2d19562957187b487f9c3d5c1fcd", 0xff}, {&(0x7f0000000240)="c000aed74621e247e9f05d7dc175313251523222aba89f82932e74a15444209be3de04d09d03ec7cb4591cab9de61eb43070f364f8ad36aea9b76a2d1e0287", 0x3f}, {&(0x7f0000000280)="c1e5e649814dc5802eeff7eeeb502390313967aa2a1df3482577c11fff3498e19d4ab4e98a1aa9d5c607138ef0c74b49a9dcf7a65a6e10bed389869afc88a3e3adb0761cccc3130c39dcf87999197000a4c23ba12748621d36859c46da6961fe3257fed0c43c4b612b50f2c85d09d71e4aa820940b7e8385e9a7872a2f6a33bb6b70477f2f80d24a0cf2fcb33cc654ceb07e2fb6f98b1c2668ed4b6d21b9d88d4c4a3e99e2504d8f2a742c4ca3edc40691c6b37e366cfd18899f3ebc4f0ede504812d03f3e13e189fb006ec7a21d9e72981f0ebb5262b9edbe62a2af8cc6b8502122e52dad2990269e9e1b95", 0xec}], 0x3, &(0x7f00000003c0)={0x10, 0x100, 0x515}, 0x10, 0xc000}], 0x1, 0x84) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) 21:03:46 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x88a8ffff, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 529.656056] FAT-fs (loop1): Unrecognized mount option "“ni_xY”ÇR÷àŸwn" or missing value 21:03:46 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0x0) 21:03:46 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x22000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:46 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x10000) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f0000000340)=0x2, 0x4) sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)={0x170, r1, 0x500, 0x70bd27, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0x34, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x80}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfffffffffffffff7}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfffffffffffffffe}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7ff}]}, @TIPC_NLA_BEARER={0x110, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @loopback}}, {0x14, 0x2, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x25f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x47a4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffffc}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x0, @mcast1, 0xffffffffffffffff}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x1, @mcast1, 0x9d}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x20, @mcast1, 0x9}}, {0x14, 0x2, @in={0x2, 0x4e23, @remote}}}}]}]}, 0x170}, 0x1, 0x0, 0x0, 0x40}, 0x4) 21:03:46 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x80, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x89e2, &(0x7f0000000080)) r1 = socket$inet6(0xa, 0x80001, 0x0) perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x2, 0x3ae5c46c3bfda47e, 0x12, 0x11, "4ffaa332d78eaa4230109ab19541fe765ab062c2d61babe81c58cc80e01f46b78c874197ebaa42f5449fcaf060db38964430bee7de516d8ce1c564ecc7447c0d", "458a5d3af4a7a5198d8593a12f00914dd6061d88e1a83c700486f6eced6862e3", [0xffffffffffff8000, 0xffffffffffffff6a]}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x300000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x90, r2, 0xce09f5d747e8b66a, 0x70bd2a, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x58, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffff501}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x20}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x40}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x400}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}]}]}, 0x90}, 0x1, 0x0, 0x0, 0x4000}, 0x20000800) getsockopt$inet6_buf(r1, 0x6, 0x21, 0x0, &(0x7f0000000000)) 21:03:46 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x7}, 0x10, 0x0}, 0x0) 21:03:46 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x88caffff, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:46 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0) 21:03:46 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x2c000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:46 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000000)) ptrace(0x10, r1) munlockall() ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="11dca5055e0bcfec7b") ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000000)) ptrace$getregset(0x4204, r1, 0x200, &(0x7f0000000140)={&(0x7f0000001300)=""/4096, 0x1000}) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) 21:03:46 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x700}, 0x10, 0x0}, 0x0) 21:03:46 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x89060000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:46 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_proto_private(r1, 0x89ec, &(0x7f0000000180)="ec27d42ae57f5541706f1b99db14a4c1add058b884376f4979a14e578bcb1b9f0968302d4aff41bcd5f8c265c5137c162b2104ae87a16ee523b0288a8ae36e826146f8616e38aa6715e975cfe7f1c5b1f9e70cacf8e41e914d515056e6af7a14f02452f5c71a07a36ab101f96cb0fbc40cd4f0e41439e731fe35d88d18e1ba6bbad47425983af5e2dcad160bd6b6147e49c8b91b923fbf479a23495029ee7129c4b0e45d3477f408d459b176eff7e0197ccdff5a8b5c0e7c833ae2b62d96341888d8abec5e939588cdd8f586b3fbd32ff9ae5e30f0a04b56150933f2642f080f9da48781") r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x8a22dd2dd20849c2, 0x0) ioctl$PPPIOCCONNECT(r2, 0x4004743a, &(0x7f00000004c0)=0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000440)='em1bdev\x00') ioctl$sock_TIOCOUTQ(r1, 0x5411, &(0x7f0000000480)) ioctl$int_in(r2, 0x5421, &(0x7f0000000340)=0x6) openat$cgroup(r2, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x4001}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0x10000, 0x0) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000280)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r3, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x14, r4, 0x100, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4800}, 0x8801) 21:03:46 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0) 21:03:46 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x3}, 0x10, 0x0}, 0x0) 21:03:46 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:46 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0xac141400, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:46 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) gettid() clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r0, 0x400, 0x1) fcntl$setown(r0, 0x8, 0x0) execveat(r0, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)) socket$isdn_base(0x22, 0x3, 0x0) 21:03:47 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x0) 21:03:47 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0xe8030000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:47 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x40000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0xf2, 0x0) ioctl$CAPI_GET_ERRCODE(r1, 0x80024321, &(0x7f00000000c0)) 21:03:47 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x4}, 0x10, 0x0}, 0x0) 21:03:47 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0x900}, 0x0) 21:03:47 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0xfdffffff, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:47 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x48000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:47 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0xfeffffff, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:47 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x300}, 0x10, 0x0}, 0x0) 21:03:47 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0xc00}, 0x0) 21:03:47 executing program 1: bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000047c0)="11dca50d5c0bcfe47bf070") 21:03:47 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x4c000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:47 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0xffffa888, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:47 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7d38, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x68ffec3627d77da3) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000080)={{0x3, 0x3}, 'port1\x00', 0x70, 0x0, 0x2, 0xfffffffffffffffe, 0xc174, 0x3, 0xffffffffffffff01, 0x0, 0x1, 0x6}) r2 = getpgid(0x0) r3 = syz_open_procfs(r2, &(0x7f0000000000)='net/pr\xc3\x85\x17-`\xc5\xcf\x96') fcntl$getflags(r0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000140)=@rc, 0x4, 0x0, 0x0, 0x0, 0xffffffffffffff3f}, 0x0) preadv(r3, &(0x7f00000017c0), 0x1fe, 0x400000000000) 21:03:47 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x3f00}, 0x10, 0x0}, 0x0) 21:03:47 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0x101d0}, 0x0) 21:03:47 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0xffffca88, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:47 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x60000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:48 executing program 1: semop(0x0, &(0x7f00000003c0)=[{0x3}, {0x0, 0x0, 0x1800}], 0x2) r0 = semget(0x0, 0x3, 0x58) semctl$GETZCNT(r0, 0x0, 0xf, &(0x7f0000000000)=""/109) 21:03:48 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0xffffdd86, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) restart_syscall() r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x880, 0x1) r2 = syz_open_dev$usbmon(0x0, 0x6, 0x4000) socket$isdn(0x22, 0x3, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000080)={{0x3b, @rand_addr=0x1, 0x4e21, 0x4, 'wlc\x00', 0x0, 0x6b1, 0x3f}, {@loopback, 0x4e23, 0x0, 0x0, 0x3}}, 0x44) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x404e20}, 0x1c) listen(r0, 0x400000001ffffffd) r3 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_sco_SCO_OPTIONS(r1, 0x11, 0x1, &(0x7f00000001c0)=""/133, &(0x7f0000000040)=0x85) r4 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r4, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0}}], 0x4000000000000d0, 0x0) ioctl$KVM_GET_CPUID2(r1, 0xc008ae91, &(0x7f00000003c0)=ANY=[@ANYBLOB="020000000000000000000000000000000000000000000000000000000000000000000000ad1334d5000000000000000000000000000007a1f8cfff22d933000000000000000000000000000000000000000000000000990000000000005227c44813579e62dafac31108fac042f73579c97b07d6fb9a9f15f082a0cfab2156b81b69caa7a786f4f68b431ce7a87c4c77d64abf1b4bfd1524631f066ec8a7659eced73d84d5c0ea22e10d81be54beeed2cf95dbb24465fb788fda882262eecc11ec8f8e88931b8ddd3e6d"]) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0x4008af13, &(0x7f0000000280)={0x1, 0x5}) 21:03:48 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0) 21:03:48 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x101d0}, 0x10, 0x0}, 0x0) 21:03:48 executing program 1: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302c4cf4b0cc5428fd7ea4651ad7b6c4a6fe90e2270864b56aa074fda57034a6c78048a29bdb002dc3088f0429530409bc2112a66077ea3d736ffc69ff02bd46f9f590a5816d0818b50672e7a64e64bdb6197bb5de65b7d1963dceb97fecc9c0028f6311c9a5b7757aedbf643014c98ed176adf1031cbc4183c46787419835f9f9d45cee9a982473cbd441f8e5e097b426f2942991f880f1706b60ebe5eab3fb3465fdabcc121eae4ba8bab0b2"], 0x15) r2 = dup(r1) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0xfffffffffffffffc, 0x25c}}, 0x20) ioctl$VIDIOC_QUERYCAP(r2, 0x80685600, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) 21:03:48 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x68000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:48 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0xfffff000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 531.736770] __ntfs_error: 47 callbacks suppressed [ 531.736781] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. 21:03:48 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x40000}, 0x10, 0x0}, 0x0) 21:03:48 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0) 21:03:48 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0xfffffffd, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 531.880057] ntfs: (device loop5): read_ntfs_boot_sector(): Could not find a valid backup boot sector. [ 531.984893] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. 21:03:48 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0xfffffffe, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 532.122725] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. 21:03:48 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x1000000}, 0x10, 0x0}, 0x0) 21:03:48 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x6b6b6b00, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) [ 532.196426] ntfs: (device loop5): read_ntfs_boot_sector(): Could not find a valid backup boot sector. [ 532.206164] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. 21:03:49 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2200, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\x10', 0xffffffffffffffff, 0x4c00000000006800}, &(0x7f0000001fee)='R\x10rist\xe3cusgrVid:De', 0x0) 21:03:49 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0x9000000}, 0x0) 21:03:49 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x6c000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) [ 532.398871] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 532.426160] ntfs: (device loop5): read_ntfs_boot_sector(): Could not find a valid backup boot sector. [ 532.437820] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. 21:03:49 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000040)={0x0, 0x5, 0x2}) setxattr$security_ima(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f0000000280)=@v2={0x0, 0x0, 0x0, 0x0, 0xfbf, "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"}, 0xfc9, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000000)=0x1c, 0x4) 21:03:49 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x1000000000000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:49 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x3000000}, 0x10, 0x0}, 0x0) 21:03:49 executing program 0: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000500)='/dev/capi20\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x4a, 0x3, 0x1, 0x7, 0x8}) fchdir(r0) ioctl$CAPI_CLR_FLAGS(r0, 0x80024322, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000000280)="4601007c02618ec4ce1c67ca1801fc4026fd8bbcd98c88a6123fc33c75dcb54d679ce9ec8495fb903be175bb512ca8df2ee04a19ab04af71d9dfd147c76d", 0x3e, 0x18c}]) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) r3 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x6, 0x2000) fcntl$notify(r2, 0x402, 0x30) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000080)=r3) 21:03:49 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0xc000000}, 0x0) 21:03:49 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x74000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:49 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0xf0ffffffffffff, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:49 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x1542da66}, 0x10, 0x0}, 0x0) [ 532.642169] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. 21:03:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) gettid() geteuid() getgid() sendmsg$unix(r0, &(0x7f0000001880)={0x0, 0x279, 0x0, 0x0, &(0x7f0000000180)=[@rights={{0x0, 0x1, 0x1, [r0, r1, r0, r0]}}], 0x18, 0x4040811}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0x0, 0x2) ioctl$SIOCNRDECOBS(r4, 0x89e2) getpeername(r1, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f0000000080)=0x80) getsockopt$bt_l2cap_L2CAP_LM(r5, 0x6, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) getsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000140)=0x9, &(0x7f00000001c0)=0x4) dup2(r3, r1) dup2(r3, r2) 21:03:49 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0x17c0e45e}, 0x0) 21:03:49 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x1) prctl$PR_SET_UNALIGN(0x6, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x20201, 0x0) write$P9_RMKNOD(r0, &(0x7f0000000080)={0x14, 0x13, 0x1, {0x0, 0x1, 0x3}}, 0x14) prctl$PR_GET_FP_MODE(0x2e) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r1, r2, 0x0, 0xffff) 21:03:49 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x7a000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:49 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$inet_buf(r1, 0x0, 0x26, &(0x7f0000000080)="9fb1589fef78fdbb05d74629e8bce7f57c595247da51c823d7ab848365a4075b4568efb25ecc1224b811ef4d8d850c2e53574787d2a8dd586819c0118c642e701cfa3a147d79957381c20637ad9614", 0x4f) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f0000000100)={0x8, 0x7ff0000000000, 0x3}) bind$rose(r1, &(0x7f0000000140)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, 0x0, [@null, @bcast, @null, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x40) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000005c0)={0x73622a85, 0x100b}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000004c0)={0x0, 0x3}, &(0x7f0000000500)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000540)=@assoc_value={r2, 0xfffffffffffffff7}, 0x8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000180)={{{@in=@multicast1, @in6=@ipv4={[], [], @loopback}}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000000280)=0xe8) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000580)={0x80000001, 0x1}) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) io_setup(0x5, &(0x7f00000002c0)=0x0) io_cancel(r3, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x6, 0xfffffffffffffff9, r0, &(0x7f0000000300)="fb57f3c3c724c2fc47993ec57ea3ec452f398e7621b7baa454d21ae841dbed97598788d524152391eda53300f31dc608e08817d2dd941eb22848644e8932783e59a98b512442532c85f7d12bc30f2d7241c17c3d390f8d545e0da0bd3c4287e4d442b2ed4f91247c42f14a1a4c82abef2351dd1a5f06a4e5769c8387", 0x7c, 0x3ff, 0x0, 0x0, r1}, &(0x7f00000003c0)) r4 = getpgrp(0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000480)={0xd, 0x401, 0x9, 0x6, 0x80000000, 0xc7cff93ce4c49e13}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) tgkill(r4, r5, 0x2a) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xf, 0x4, 0x80000000004, 0xe657, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x4}, 0x3c) 21:03:49 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x100000000000000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 532.872353] net_ratelimit: 21 callbacks suppressed [ 532.872361] protocol 88fb is buggy, dev hsr_slave_0 [ 532.872384] protocol 88fb is buggy, dev hsr_slave_1 [ 532.877406] protocol 88fb is buggy, dev hsr_slave_1 21:03:49 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x3f000000}, 0x10, 0x0}, 0x0) 21:03:49 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0x3c24ff8f}, 0x0) 21:03:49 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:49 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x200000000000000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:49 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$inet_buf(r1, 0x0, 0x26, &(0x7f0000000080)="9fb1589fef78fdbb05d74629e8bce7f57c595247da51c823d7ab848365a4075b4568efb25ecc1224b811ef4d8d850c2e53574787d2a8dd586819c0118c642e701cfa3a147d79957381c20637ad9614", 0x4f) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f0000000100)={0x8, 0x7ff0000000000, 0x3}) bind$rose(r1, &(0x7f0000000140)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, 0x0, [@null, @bcast, @null, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x40) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000005c0)={0x73622a85, 0x100b}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000004c0)={0x0, 0x3}, &(0x7f0000000500)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000540)=@assoc_value={r2, 0xfffffffffffffff7}, 0x8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000180)={{{@in=@multicast1, @in6=@ipv4={[], [], @loopback}}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000000280)=0xe8) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000580)={0x80000001, 0x1}) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) io_setup(0x5, &(0x7f00000002c0)=0x0) io_cancel(r3, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x6, 0xfffffffffffffff9, r0, &(0x7f0000000300)="fb57f3c3c724c2fc47993ec57ea3ec452f398e7621b7baa454d21ae841dbed97598788d524152391eda53300f31dc608e08817d2dd941eb22848644e8932783e59a98b512442532c85f7d12bc30f2d7241c17c3d390f8d545e0da0bd3c4287e4d442b2ed4f91247c42f14a1a4c82abef2351dd1a5f06a4e5769c8387", 0x7c, 0x3ff, 0x0, 0x0, r1}, &(0x7f00000003c0)) r4 = getpgrp(0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000480)={0xd, 0x401, 0x9, 0x6, 0x80000000, 0xc7cff93ce4c49e13}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) tgkill(r4, r5, 0x2a) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xf, 0x4, 0x80000000004, 0xe657, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x4}, 0x3c) 21:03:49 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0x5ee4c017}, 0x0) 21:03:49 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x66da4215}, 0x10, 0x0}, 0x0) 21:03:49 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x97ffffff, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) [ 533.832895] protocol 88fb is buggy, dev hsr_slave_0 [ 533.838405] protocol 88fb is buggy, dev hsr_slave_1 [ 533.992370] protocol 88fb is buggy, dev hsr_slave_0 [ 533.997640] protocol 88fb is buggy, dev hsr_slave_1 [ 534.002811] protocol 88fb is buggy, dev hsr_slave_0 [ 534.008366] protocol 88fb is buggy, dev hsr_slave_1 [ 534.014525] protocol 88fb is buggy, dev hsr_slave_0 21:03:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x84, r1, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3ff}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3f}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00'}]}]}, 0x84}}, 0x4000000) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYSTD(r2, 0x8008563f, &(0x7f00000004c0)=0x0) ioctl$VIDIOC_S_STD(r2, 0x40085618, &(0x7f0000000500)=r3) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x85388984e4ca0666, 0x0) ioctl(r2, 0xf5, &(0x7f0000000300)="55c30b1d97c75f97085d07ed7f74af88b5554e2b42a283c32f623ed8818901bd0e15734bc7643a3d529899d14894adf72230280d8447bed9b3b2facabfcd855e4a94c90bd97d428802992ac18f834e1201b3c2ef841651169c23e2072f4be301577ed7cd") mknodat(r2, &(0x7f00000002c0)='./file0\x00', 0x100, 0x7ff) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r4, &(0x7f0000000000)=ANY=[], 0x0) getsockname(r0, &(0x7f0000000400)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000480)=0x80) fsetxattr$security_ima(r4, &(0x7f0000000380)='security.ima\x00', &(0x7f00000003c0)=@sha1={0x1, "4bbe9aad3652bad304767a73acf6e5f390773a70"}, 0x15, 0x1) 21:03:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x3, &(0x7f0000000000)="11dca5055e0bcfe47bee70") prctl$PR_SET_TIMERSLACK(0x1d, 0xfffffffffffffffd) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000040)=""/4096, &(0x7f0000001040)=0x1000) futex(&(0x7f000000cffc)=0x100000000000004, 0x9, 0x4, &(0x7f0000edfff0), 0x0, 0x1) futex(&(0x7f000000cffc), 0x1, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$cec(&(0x7f0000001080)='/dev/cec#\x00', 0x3, 0x2) ioctl$IMGETVERSION(r1, 0x80044942, &(0x7f00000010c0)) 21:03:51 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x300000000000000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:51 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0x8fff243c}, 0x0) 21:03:51 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0xc45c80eb}, 0x10, 0x0}, 0x0) 21:03:51 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0xc0ed0000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) [ 534.469821] IPVS: length: 4096 != 24 21:03:51 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x400000000000000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:51 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0xd0010100}, 0x0) 21:03:51 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0xd0010100}, 0x10, 0x0}, 0x0) [ 534.543130] IPVS: length: 4096 != 24 21:03:51 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x6009, 0x1) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000140)={0x473}, 0x4) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x20800, 0x0) read$rfkill(r1, &(0x7f0000000040), 0x8) mount(&(0x7f0000001e00)=ANY=[@ANYBLOB='./\x00ile0\x00'], &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='squashfs\x00', 0x0, 0x0) openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) 21:03:51 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0xd2030000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:51 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r0, &(0x7f0000000040)="1f0000000a06ff00fd4354c007110000f305030205000100130423dcffdf00", 0x3f2) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r1, 0xc05c5340, &(0x7f0000000080)={0x5, 0x3, 0x8, {0x77359400}, 0x8, 0x2}) ioctl$VIDIOC_G_EDID(r1, 0xc0285628, &(0x7f0000000140)={0x0, 0x6, 0x2, [], &(0x7f0000000100)=0x3}) 21:03:51 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x600000000000000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:51 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0xeffdffff}, 0x0) 21:03:51 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) [ 534.726358] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.1'. 21:03:51 executing program 0: arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000080)) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ubi_ctrl\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001e40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000880)=""/231, 0xe7}}], 0x1, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000000c0)=0x4, 0x4) socketpair$tipc(0x1e, 0x7, 0x0, 0x0) prctl$PR_CAPBSET_READ(0x17, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000200)) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vhci\x00', 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, 0x0, &(0x7f0000000500)) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000600), &(0x7f0000000740)=0x4) sendto$inet(r2, 0x0, 0xffffffffffffff0c, 0x0, 0x0, 0xb2) r3 = fcntl$getown(0xffffffffffffffff, 0x9) tkill(r3, 0x1f) r4 = syz_open_procfs(0x0, &(0x7f00000007c0)='status\x00') lookup_dcookie(0x0, &(0x7f00000002c0)=""/135, 0x87) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f0000000b00)={{}, {0x7}, 0x1f}) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x4000, 0x133) preadv(r4, &(0x7f00000017c0), 0x199, 0x0) write$P9_RVERSION(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="1500000065ffff0500000008003958323030302e4c445b8f14f9ad05d8bd51676ab9b6570b2b33021f466e02017314611cb274601caed7f8da9a5cc023b38ee0825fafac83671bc6727d1795d91f41b6812694b793f791f7a71a8f3c5fdbe68ac902737f315a5fa1cd5928170258b0e4ee2fa0bdd02049bfe327793632f34cb549d38067a98f6bc70d38160a38a4c95c276ec4acb615cb167c5af6affc00ab0da09448eab0aaad5d7db4"], 0xaa) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000a80)=[{&(0x7f00000004c0)=@in6={0xa, 0x4e22, 0x10000, @mcast1, 0x5}, 0x1c, &(0x7f0000000540), 0x0, 0x0, 0x0, 0x20000000}], 0x1, 0xfc1a21313749e509) 21:03:51 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0xeb805cc4}, 0x10, 0x0}, 0x0) [ 534.780530] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.1'. 21:03:51 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0xfcfdffff, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:51 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x700000000000000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x101000) ioctl$DRM_IOCTL_SET_UNIQUE(r1, 0x40106410, &(0x7f0000000080)={0xed, &(0x7f0000000100)="4765946f6fc6b2e6b72838bb38735d13ca2e9641be7a156918c9370fbefa62e49f555322cc8c8b088b32b5cbef70eea1300990aa51fa41e714e24240d671e42e3459b964dfba287f083b43c3d46fac94b211e34bb73e0f44d668a81f826b16a223a6ec244489e094244ef36a54047b537c2eaec56992e47b1cd0d5e6d985ca07322224b8618e577820ba74a881520b399c7ea2f2388733de2efd64895836f3cad0c308d5ba3bd8a16dcafac17feba18780c4894d1f8e1bc162b1777b1c3d2611f104afd883fdd2c7e52cf8c12c4044f2b192476c24ee00ae4f64404160ce375ecff569465af0cc547be2310c46"}) r2 = dup(r0) ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f0000000000)) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca50d5e0bcfe47bf070") r3 = socket$inet(0x2, 0x200000002, 0x0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x20000004e21, @multicast1}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000300)=ANY=[@ANYBLOB="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"/289], 0x0) 21:03:51 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x40000, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000001dc0), &(0x7f0000001e00)=0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000100)=@ccm_128={{0x303}, "b0545c28d47dcdda", "3fec16d9fe4cc2437ca44d6e27b4fa1e", "9581d0f4", "ff17dc44500e94db"}, 0x28) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) 21:03:51 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0xffffff7f}, 0x10, 0x0}, 0x0) 21:03:51 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffdef}, 0x0) 21:03:51 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x800000000000000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:51 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0xfdfdffff, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:51 executing program 0: keyctl$instantiate(0xc, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="6e65772075738300b781780132c102016068478065723a73797a20303030300000000000000000"], 0x1, 0x0) request_key(&(0x7f0000000040)='big_key\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)='encrypted\x00', 0xfffffffffffffff8) r0 = request_key(&(0x7f0000000140)='syzkaller\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='syz', 0xfffffffffffffffe) add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000002c0)="3b50f03901a6411990183818a96861874486bf1be8ec5d34d6cda8a40368e24da77e2a9dd9e0e21662ee54719668f74661f588a0b5ec4c02e6e5e68458aaac40126014557026683a3077aa653f793f0aeb9a0ad1b1ae3ea6b5fd885c0b2065329cdb86eca574ecc3eab2a91007e85d7f1f59826bb852f17fb51b7d9fbbe152b803f982cc248668104148bbe2e5575d3b74dc5a779cd7c958d62aa3e9f2e506b63420d5ed0e60a3a01940832754d9ec8679da369727782accd074bdc5ccc78821e426", 0xc2, r0) 21:03:51 executing program 1: r0 = socket(0xa, 0x6, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @broadcast, @initdev}, &(0x7f0000000040)=0xc) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=@ipv6_getnetconf={0x14, 0x4f, 0x301}, 0x14}}, 0x0) 21:03:51 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x806000000000000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:51 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x4000000000000}, 0x10, 0x0}, 0x0) 21:03:51 executing program 1: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x0) fcntl$setpipe(r0, 0x407, 0x0) 21:03:51 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"/295], 0x24}}, 0x0) 21:03:51 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0xffffff7f}, 0x0) 21:03:52 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0xfdffffff, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:52 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000400), 0x0) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000000)=""/144) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, 0x0, 0xfffffffffffffed8) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r0, 0x2) ioctl$TIOCGISO7816(r0, 0x80285442, &(0x7f00000000c0)) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, 0x0) r2 = creat(&(0x7f0000000300)='./bus\x00', 0x1) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) sendmsg$sock(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000001600)=[@txtime={{0x18, 0x1, 0x3d, 0x5}}, @txtime={{0x18}}, @txtime={{0x18, 0x1, 0x3d, 0x8}}, @timestamping={{0x14}}, @txtime={{0x18, 0x1, 0x3d, 0xff}}, @timestamping={{0x14, 0x1, 0x25, 0x100}}, @txtime={{0x18, 0x1, 0x3d, 0x9}}], 0xa8}, 0x4000014) ustat(0x1000005, &(0x7f0000000500)) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, 0x0, 0x0) 21:03:52 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0xb00000000000000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:52 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x100000000000000}, 0x10, 0x0}, 0x0) 21:03:52 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000080)=0x16f38f76, 0x4) kexec_load(0x4000000004, 0x2, &(0x7f0000000040)=[{0x0}, {0x0, 0x3e2}], 0x160000) getsockopt(r0, 0x7b5, 0x1000, &(0x7f0000000100)=""/88, &(0x7f0000000180)=0x58) prctl$PR_GET_FPEMU(0x9, &(0x7f00000000c0)) 21:03:52 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0) 21:03:52 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0xd00000000000000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt(r0, 0x2e, 0x400, &(0x7f0000000080)=""/140, &(0x7f0000000000)=0x8c) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001985680c1ba3a20400ff7e280000005e00ffffba162441caf0da3b40c925234476d0b818a0aa1c0009b3ebea8653b1cc7e6397", 0x4c}], 0x1}, 0x0) 21:03:52 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x300000000000000}, 0x10, 0x0}, 0x0) 21:03:52 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0xfeffffff, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:52 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x3f00000000000000}, 0x10, 0x0}, 0x0) 21:03:52 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x1000000000000000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:52 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r1, 0x1, 0x0, 0x0, {0x15}}, 0x14}}, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x1, 0x40) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000040), 0x4) 21:03:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000089288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000200)="1cb7893e9f027524044a5dedae1e3502af2ed3381a59dc167ad7645812617bd0fbe491684c004ab014939fe833b1f9382134b9f8d92a2e914dd55aa3a0c49832ef3be097952331a627430d5dfc", 0x5}], 0x1b9, &(0x7f0000000740)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1}, 0x0) r2 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x6, 0x400000) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280)={0x0}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000300)=r3, 0x4) r4 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) getsockopt$bt_sco_SCO_OPTIONS(r4, 0x11, 0x1, &(0x7f0000000180)=""/66, &(0x7f0000000040)=0x42) 21:03:52 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0) 21:03:52 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000421, 0x1) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) r1 = accept4(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f00000000c0)='./file0/file0/file1\x00', &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f00000004c0)='./file0/file0/file0\x00', 0x14, 0x1) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000500)=0xe8) stat(&(0x7f0000000100)='./file0/file0/file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_xen(&(0x7f0000000000)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='9p\x00', 0x8, &(0x7f0000000400)={'trans=xen,', {[], [{@euid_lt={'euid<', r2}}, {@fowner_gt={'fowner>', r3}}, {@obj_role={'obj_role', 0x3d, '\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f'}}]}}) 21:03:52 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x1400000000000000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:52 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0x900000000000000}, 0x0) 21:03:52 executing program 1: syslog(0x2, &(0x7f0000000280)=""/172, 0xfffffffffffffce2) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0xd0001, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) 21:03:52 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x66da421500000000}, 0x10, 0x0}, 0x0) 21:03:52 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000421, 0x1) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) r1 = accept4(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f00000000c0)='./file0/file0/file1\x00', &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f00000004c0)='./file0/file0/file0\x00', 0x14, 0x1) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000500)=0xe8) stat(&(0x7f0000000100)='./file0/file0/file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_xen(&(0x7f0000000000)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='9p\x00', 0x8, &(0x7f0000000400)={'trans=xen,', {[], [{@euid_lt={'euid<', r2}}, {@fowner_gt={'fowner>', r3}}, {@obj_role={'obj_role', 0x3d, '\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f'}}]}}) 21:03:52 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0xffff1f00, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:52 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x1800000000000000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:52 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mq_open(&(0x7f00000001c0)='trustedtrustedselinux\x00', 0x0, 0x0, 0x0) socket$inet(0x2, 0xa, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) 21:03:52 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000}, 0x0) 21:03:52 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0xc45c80eb00000000}, 0x10, 0x0}, 0x0) 21:03:53 executing program 1: clock_adjtime(0x0, &(0x7f0000000180)={0xfffffffffffffc01}) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000140)={0x0, 0x9ed2}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000002c0)={r1, 0x7, 0x7}, 0x10) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x210040) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x8001}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000000c0)={r3, 0xff, 0xfffffffffffffffd, 0x81}, 0x10) 21:03:53 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000000000000000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:53 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0x5ee4c01700000000}, 0x0) 21:03:53 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0xd001010000000000}, 0x10, 0x0}, 0x0) 21:03:53 executing program 0: r0 = creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000340)={0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4}, 0x0, @in=@broadcast}}, &(0x7f0000000480)=0xe8) getresgid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)=0x0) sendmsg$unix(r1, &(0x7f0000000640)={&(0x7f0000000080)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000000300)=[{&(0x7f0000000100)="2f73d8257a66d85412fc287a1ae51f7ebdcd625383805df4c62ffb3eb53782997a8a07be54da503769785b372d8c7ced3a1e67a1bd7fac6dcc1fd59a865e73a3cd2f06cb95d57a41e7675b7015df93c99aa16e852747de4bf4d94f6a1876d3dc40eafd330ae211609858617f0b9eee33a041dfa5ff498f685b0a13d62a44381a6ec29a99a13e94a039f0ed447d23ea28327a", 0x92}, {&(0x7f0000000200)="49d8fc235df40fdac28394a19b588b8ad03f6b13de17b3fba3749b55265506bf732b97ee738d84079dd545d9436fb67abd9a02c984127ce6a9538b4b2ff7845076062d40844f0854efecd0155be8eff5f225bbe83c579e7bb8cbcd4a5bc48a792f5ab03f7e44b0d2086608ae282dd7f14995c681202e240f1cdcc81e69d7c4a06e552a5281903200abaa69049bb0e5533a02d5f5f8f0fd40159fc91a3381ffbbf4e02abeb69db0a7341cf13d36411d4050a557aa83f3f9ec9cabb570ac01d315acf9641ab997528dedc96c44a85a2da01e26261b925336fc79efb7a2e5aebe4b28a1225a4741683cdef0203d0d2891aac711", 0xf2}], 0x2, &(0x7f0000000580)=[@rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x24, 0x1, 0x1, [r0, r0, r0, r0, r0]}}, @rights={{0x24, 0x1, 0x1, [r0, r0, r0, r0, r0]}}, @rights={{0x34, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r2, r3, r4}}}], 0xc0, 0x800}, 0x800) r5 = add_key(&(0x7f0000000700)='rxrpc_s\x00', &(0x7f0000000740)={'syz', 0x0}, &(0x7f0000000780)="76de839eafe192e66c222652a3e209059c0fb358489e212b0594d18f64e488fdceaeb0d2095b35095c18b73baa46784bb328b106c68a10a6cf93330a3db3c26c2d94b8eb922fda2848d27c3aee010c604334b238ac6c8739a7fcddaefe12ec5516d0086d7e126a42aaa403999b5f0a9bb57e6ef5b9cc2b3fa5aee6105634de6730446f5292d406b745ef8c5739b277fb5fd5b9b6e26fa341", 0x98, 0x0) keyctl$describe(0x6, r5, &(0x7f0000000840)=""/129, 0x81) fchown(r0, 0x0, 0x0) bind$tipc(r0, &(0x7f0000000000)=@name={0x1e, 0x2, 0x1, {{0x43, 0x1}, 0x4}}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000006c0)={r0, 0xc, 0x1, 0x2, &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa}, 0x20) ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e4) 21:03:53 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0xfffffdfc, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'erspan0\x00', 0x0}) bind$packet(r0, &(0x7f0000000640)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x2000, 0x0) accept$inet6(r2, 0x0, &(0x7f0000000040)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000300)="0503000189063e0060000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 21:03:53 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2600000000000000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:53 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0x8fff243c00000000}, 0x0) 21:03:53 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0xffffff7f00000000}, 0x10, 0x0}, 0x0) 21:03:53 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net\x00') exit(0x0) readlinkat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=""/9, 0x9) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000100)={{{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@remote}}, &(0x7f0000000200)=0xe8) r2 = getuid() bind$isdn(r0, &(0x7f0000000900)={0x22, 0x80, 0xfffffffffffffc01, 0x3ff, 0x1074}, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) syz_open_dev$dri(&(0x7f00000008c0)='/dev/dri/card#\x00', 0x38f, 0x200) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f00000003c0)=0xe8) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@initdev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@ipv4={[], [], @initdev}}}, &(0x7f0000000640)=0xe8) r8 = geteuid() getresgid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700)=0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000740)={0x0, 0x0, 0x0}, &(0x7f0000000780)=0xc) lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r12 = getegid() ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f0000000a00)) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000880)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000940)=ANY=[@ANYBLOB="02000000010000000000000002000200", @ANYRES32=r1, @ANYBLOB="02000200", @ANYRES32=r2, @ANYBLOB="02000200", @ANYRES32=r3, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="02000600", @ANYRES32=r5, @ANYBLOB="02000600", @ANYRES32=r6, @ANYBLOB="0000ce3f71ada536fde48ec8070000", @ANYRES32=r7, @ANYBLOB="02000400", @ANYRES32=r8, @ANYBLOB="040003000000000008000300", @ANYRES32=r9, @ANYBLOB="08000400", @ANYRES32=r10, @ANYBLOB="08000500", @ANYRES32=r11, @ANYBLOB="08000400", @ANYRES32=r12, @ANYBLOB="10000100000000002000040000000000"], 0x84, 0x2) [ 536.752148] __ntfs_error: 56 callbacks suppressed [ 536.752157] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 536.759686] audit: type=1400 audit(1566939833.422:278): avc: denied { setattr } for pid=29118 comm="syz-executor.0" name="net" dev="proc" ino=111812 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 21:03:53 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2800000000000000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:53 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x3}}, 0x10, 0x0}, 0x0) [ 536.831311] ntfs: (device loop5): read_ntfs_boot_sector(): Could not find a valid backup boot sector. 21:03:53 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0xd001010000000000}, 0x0) 21:03:53 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xfffffffffffffff8}) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000380)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2}) r2 = dup2(r1, r0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000000)={0xffff, 0x6, 0x6, 0x3ff, 0x5, 0xffffffffffffff87, 0x100}, 0xc) read(r1, &(0x7f00000000c0)=""/19, 0x8) [ 536.949785] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. 21:03:53 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x4000000000000000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:53 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:53 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x4}}, 0x10, 0x0}, 0x0) 21:03:53 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0xeffdffff00000000}, 0x0) [ 537.141958] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. 21:03:53 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x4305000000000000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:53 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x40, 0x80) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f0000000080)=""/70) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x0, 0x0) close(r2) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000180)={'bridge_slave_1\x00', @random="01003a1e2410"}) [ 537.210917] ntfs: (device loop5): read_ntfs_boot_sector(): Could not find a valid backup boot sector. 21:03:53 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x300}}, 0x10, 0x0}, 0x0) [ 537.272636] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. [ 537.401771] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 537.436912] ntfs: (device loop5): read_ntfs_boot_sector(): Could not find a valid backup boot sector. [ 537.446790] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. 21:03:54 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x22, 0x0) bind$tipc(r0, 0x0, 0xfffffe13) ioctl$TCGETS(r0, 0x5401, &(0x7f00000002c0)) preadv(r0, &(0x7f0000000880)=[{&(0x7f0000000100)=""/68, 0x1b}, {&(0x7f0000000600)=""/202, 0xca}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000300)={{0xfffffffffffffffa, 0x1}, 0x1, 0x3, 0xba1b, {0x810, 0x20000000000007}, 0x3, 0x7}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000180)={{{@in=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000000000)=0xe8) bind$can_raw(r0, &(0x7f0000000280)={0x1d, r1}, 0x10) prctl$PR_GET_DUMPABLE(0x3) 21:03:54 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x6000000000000000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:54 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000}, 0x0) 21:03:54 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x6e, 0x0, 0x4) 21:03:54 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x3f00}}, 0x10, 0x0}, 0x0) 21:03:54 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0xffffff7f, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:54 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x800e000000000000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:54 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x2, 0x2) accept$ax25(r1, 0x0, &(0x7f0000000180)=0x30c) ioctl$KVM_SET_CPUID2(r1, 0x4008ae90, &(0x7f00000003c0)={0x9, 0x0, [{0xd, 0x5, 0x0, 0x80000001, 0x8, 0x0, 0x8}, {0x7, 0x4, 0x5, 0x7f, 0x645a, 0x9, 0x3}, {0x7, 0xffffffff, 0x1, 0xb58e, 0x10001, 0x68f}, {0x80000007, 0x7fffffff, 0x1, 0x3ff, 0x10000, 0x5abf654c, 0xac6b}, {0x8d66304e7de4bc21, 0x0, 0x3, 0x400, 0x1, 0x3ac8f1a5, 0x3ff}, {0xc0000001, 0x838, 0x7, 0x8000, 0xffffffffffffff5a, 0x6, 0x4}, {0xb, 0x1, 0x6, 0x0, 0x81, 0x5, 0x7a}, {0x80000008, 0x3, 0x2, 0xffffffff7fffffff, 0x4, 0x3, 0x401}, {0x80000019, 0xd2, 0x1, 0x1, 0x4, 0x3f, 0xbc82}]}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0xfffffffffffff000, 0x15c, 0x0, &(0x7f0000000380)="263abd030e98ff4dc870bd6688a8", 0x0}, 0x28) 21:03:54 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x4b03, 0x2) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x200, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x101000, 0x0) r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SENDCALLACCPT(r2, 0x89e9) r3 = gettid() timer_create(0x7, &(0x7f0000000240)={0x0, 0x24, 0x2, @tid=r3}, &(0x7f0000001300)) r4 = dup3(r1, r0, 0x0) getsockopt$inet_mreqn(r4, 0x6, 0x0, 0x0, &(0x7f0000000280)) lsetxattr$trusted_overlay_upper(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', &(0x7f00000002c0)={0x0, 0xfb, 0x1015, 0x2, 0x7ff, "20aad8c4b9e6f026749501481295b082", "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"}, 0x1015, 0x1) 21:03:54 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0x0) 21:03:54 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x101d0}}, 0x10, 0x0}, 0x0) 21:03:54 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:54 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x8035000000000000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x20000041, &(0x7f000039a000)}, 0x10) 21:03:54 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 21:03:54 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000040)=0x28, 0x4) lseek(r0, 0x0, 0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, r2, 0x700, 0x70bd2a, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x6, 0x1, 0x8, 0xb96}}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4008801}, 0x200008d4) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000200)={'syz_tun\x00', 0x1}) sendmmsg(r1, &(0x7f00000087c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[{0x10, 0x1, 0x1}], 0x10}}], 0x1, 0x0) 21:03:54 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0xffffff97, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:54 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x8100000000000000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:54 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x40000}}, 0x10, 0x0}, 0x0) [ 537.992424] net_ratelimit: 16 callbacks suppressed [ 537.992433] protocol 88fb is buggy, dev hsr_slave_0 [ 537.997591] protocol 88fb is buggy, dev hsr_slave_1 21:03:54 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 21:03:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000003c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-blowfish-asm\x00'}, 0x58) flock(r0, 0xa) r1 = accept4(r0, 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f0000000080)={0x9, 0x1, 0x80000000, 0x8, 0x1c000, 0x0, 0x7, 0x1000}, &(0x7f00000000c0)={0x4464a2ca, 0x2, 0x8, 0xfc, 0xffff, 0x7fffffff, 0xffff, 0x1}, &(0x7f0000000100)={0x1, 0x2, 0x2, 0x10000, 0xd9, 0x3, 0x6, 0xfffffffffffff001}, &(0x7f0000000140), &(0x7f00000001c0)={&(0x7f0000000180), 0x8}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5", 0x4) sendmmsg$sock(r1, &(0x7f0000000000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@txtime={{0x18, 0x117, 0x2}}], 0x18}}], 0x2, 0x0) 21:03:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0) close(r1) sendfile(r1, r1, &(0x7f0000000340), 0x5) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getgid() chown(&(0x7f0000000000)='./file0\x00', r2, r3) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_stats\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000280)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, r5, 0x300, 0x70bd2d, 0x25dfdbff, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4080}, 0x80) readv(r1, &(0x7f00000002c0), 0x1e) 21:03:54 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x86ddffff00000000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 538.152448] protocol 88fb is buggy, dev hsr_slave_0 [ 538.157777] protocol 88fb is buggy, dev hsr_slave_1 [ 538.162424] protocol 88fb is buggy, dev hsr_slave_0 [ 538.168012] protocol 88fb is buggy, dev hsr_slave_1 [ 538.173337] protocol 88fb is buggy, dev hsr_slave_0 [ 538.178520] protocol 88fb is buggy, dev hsr_slave_1 21:03:54 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 21:03:54 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:54 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x1000000}}, 0x10, 0x0}, 0x0) 21:03:55 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x8847000000000000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:55 executing program 0: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x10800, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$bt_cmtp(0x1f, 0x3, 0x5) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7bf070") setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{0x2000000000040}, {0x6}]}, 0x10) sendmmsg(r1, &(0x7f0000008240)=[{{0x0, 0x0, &(0x7f0000003500)=[{&(0x7f0000000180)="f396927e", 0x4}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) write$binfmt_misc(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="73797a3074a85a9745446e864f7063235adc237eee57724c510158cf1014355d5104e57c02f7f534ed1d90f86a3b2a69001275ed4191f7b59dd9172605d0c840023f878b0fef0eb23b4303a0f925cf276bcfdf8e51c45ec1de36430c14b1d97962da353f2156ed8cbcf2d21f165e307e96b729ee66940947764d92ce7edcea86b7b01945ab639dbbe2d578df44c1eae70d045354875751d36e7fea3c82846261d7ebe233dd5a8e8c5b2b7268802a91"], 0xaf) 21:03:55 executing program 1: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f00000001c0)={0x0, 0x2fc, &(0x7f0000000000)=[{&(0x7f0000000180)="24000000240007251dfffd940101830020200a000900000000000100ffffffff0d00ff7e", 0x24}], 0x1}, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x5e2, 0xfffffffffffffffa, 0x10000, 0xf3}, {0x1, 0x0, 0xffff, 0x3f}]}, 0x10) 21:03:55 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 21:03:55 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x3000000}}, 0x10, 0x0}, 0x0) 21:03:55 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x8848000000000000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:55 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0xfffffffd, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x10880, &(0x7f00000001c0)={[{@metacopy_on='metacopy=on'}, {@xino_on='xino=on'}, {@redirect_dir={'redirect_dir', 0x3d, './file0'}}], [{@uid_lt={'uid<', r1}}, {@dont_measure='dont_measure'}]}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000080)=0x4) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100) socket$inet(0x10, 0x3, 0xc) 21:03:55 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) ioctl$VIDIOC_DBG_G_CHIP_INFO(r0, 0xc0c85666, &(0x7f0000000240)={{0x978a54576cf1e84f, @addr=0x6db}, "78baf3d0b81a8720882e45c3503f4bbaf8409675be4caf5f4256ce2acdcbdfc4", 0x1}) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x2cc0209a) splice(r0, 0x0, r2, 0x0, 0x10010001, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000000)=[@in6={0xa, 0x4e22, 0x3, @rand_addr="2625a380ac160bb80048906e351f19ec", 0x40}, @in={0x2, 0x4e22, @loopback}, @in={0x2, 0x4e20, @multicast2}], 0x3c) 21:03:55 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 21:03:55 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x8864000000000000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:55 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x1542da66}}, 0x10, 0x0}, 0x0) [ 538.687959] overlayfs: unrecognized mount option "uid<00000000000000000000" or missing value 21:03:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) close(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00005befdc)) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r1, 0x0) getresuid(&(0x7f0000000180), &(0x7f0000000200)=0x0, &(0x7f0000000240)) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$setflags(r2, 0x2, 0x1) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x800000, &(0x7f0000000340)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x3000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r5}, 0x2c, {[{@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x8}}, {@blksize={'blksize', 0x3d, 0xc00}}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}]}}) io_setup(0xd30, &(0x7f0000000500)=0x0) io_submit(r6, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000005, 0x0, r0, 0x0}]) ioctl$TIOCGISO7816(r1, 0x80285442, &(0x7f0000000080)) 21:03:55 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0xfffffffe, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:55 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 21:03:55 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x88a8ffff00000000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:55 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x3f000000}}, 0x10, 0x0}, 0x0) 21:03:55 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000480)="2e0000002b008163e45ae087000000010e0f0000000000bc4cc91b4dd65b2f0580cb7023072a556d1c958c000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) dup2(r0, r0) 21:03:55 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x88caffff00000000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:55 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x1000000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) [ 539.112339] protocol 88fb is buggy, dev hsr_slave_0 [ 539.112343] protocol 88fb is buggy, dev hsr_slave_0 21:03:56 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cuse\x00', 0x82, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='loginuid\x00') fsetxattr$trusted_overlay_origin(r1, &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockname$unix(r1, &(0x7f0000000300), &(0x7f0000000040)=0x6e) io_setup(0xa, &(0x7f0000000100)=0x0) io_submit(r2, 0x1, &(0x7f0000001b00)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 21:03:56 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 21:03:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec", 0x4) r1 = open(&(0x7f0000000000)='./file0\x00', 0x88200, 0x2) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r1, 0xc0905664, &(0x7f0000000380)={0x0, 0x0, [], @raw_data=[0x401, 0x80000000, 0xc9, 0x2, 0x8, 0x68, 0xfffffffffffffffe, 0x2, 0xfff, 0xba7, 0x1f, 0x6, 0x400, 0x8, 0x2, 0x1ee, 0x8, 0x3, 0x401, 0x1, 0x3, 0x7, 0x5, 0xfff, 0x20, 0xa5b5, 0x1, 0x1, 0x1b27800000, 0x5, 0x5, 0xfff]}) r2 = accept$alg(r0, 0x0, 0x0) r3 = creat(&(0x7f0000000340)='./file0\x00', 0x10) write$selinux_create(r3, &(0x7f0000000180)=ANY=[@ANYBLOB="73797374656d5f753a6f626a6563745f723a73726f6e645f657865635f743a733020756e636f6e66696e65645f753a73797374656d5f723a69736d6f645f7442bc302d73303a63302e633130323320303030303030303030303030303020303030303100"/110], 0x65) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) ioctl$PIO_SCRNMAP(r3, 0x4b41, &(0x7f0000000200)="899474ed2502879f7eea9bb986380900f6a642ab74b4d8b40cf5a03d0c019bf3324065c5748f35e3be5e38b9d972c4de7d7fdea372c591286cdbcbb5fae5b24754436e06aae0bad650b32d472624c92731b6573b9c71dc4da7dfab1b0b2a138d9540f6b382289fb2d995b96e202da916bac1ed4f61b447165299ebc886ddc32081506690a370853fde977d23f9c235b1be5b537508c33dce8266d7f0bfd2e9cc51035d93fade1bb7c38d4ee5605693fbc95ecffdef756d6bc826aa960957c3e4ecea47ac80dcaa1d28dfc4eaf33448ef6f8094aec824adeeff83d621ee0a80ea7aaaf2576a9ffb3759b3979d64") recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f00000023c0)=""/49, 0x31}], 0x1}}], 0x1, 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x65) ioctl$VIDIOC_G_EDID(r3, 0xc0285628, &(0x7f0000000140)={0x0, 0xf5, 0x9, [], &(0x7f0000000100)=0x13}) 21:03:56 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x8906000000000000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:56 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x66da4215}}, 0x10, 0x0}, 0x0) 21:03:56 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0xedc000000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:56 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0xac14140000000000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:56 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0xc45c80eb}}, 0x10, 0x0}, 0x0) 21:03:56 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x10000, 0x10000) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f00000000c0)=""/4) bind$inet6(r0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, 0x0) sched_setaffinity(0x0, 0x2, &(0x7f0000000140)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext={0x1000}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) pwrite64(r1, &(0x7f0000000280)="20e76ad810eee8eb0f011c117103acbc68c646c493f203eb431f16766d3996e29799d822aa9d619840df59d6602330dd9908907dda52ec34ff1d8baae324de17ea5e41035d57d86ac2c110ac4ad8b8945a6809d1ca0118d5ff1cc21a14b95ae16804c7f2c303352af5f5831bd022036ed4f3f61ffdab4931dd4715f415df21bb1fe859e49bad0bf8851be7ca896c636df1cb87035abfe71b8e8312913c07bfe3297cba5dfe80ab17cf9c", 0xaa, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 21:03:56 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 21:03:56 executing program 0: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000080)={0x0, 0x1, 0x10000}) r0 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x2, 0xb146f644c0f36b19) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000100)={0x5, 0x20, 0x6, 'queue0\x00', 0x80000000}) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x8, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) accept$packet(r0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000300)={0x1000, {0xffffffffffffff50, 0x0, 0x8, 0x9, 0x9, 0x6}}) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000340)={0x90, 0x0, 0x10000, 0x3f}) ioctl$DRM_IOCTL_AGP_BIND(r0, 0x40106436, &(0x7f0000000380)={r4, 0x9}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00', r3}) 21:03:56 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x4000000000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:56 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0xe803000000000000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:56 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0xd0010100}}, 0x10, 0x0}, 0x0) 21:03:56 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 21:03:56 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0xe000000000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:56 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0xfdffffff00000000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:56 executing program 0: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0x4) pwrite64(r0, &(0x7f0000000180)="05273f4f0f3e245905a711bc4807ae90623391bf1d957a101ebdbf91c91e56fb9da8f9f95549fc7c64afcbb299368e47593108ac05ca046c134aba36a37b974cd5080ec8aac70647575c9d6e1770a3f3e50fbeb48a79c2ab69e4f560dd02a49d790eb95c12e0c42db53eae31230208cfe69a9243138ecdbdc07e7a7e91d66ba9df94b93b37b5890e5d3be6be3be5ecff4c7b77dcb6dd4225e4e4063d79fb94a1", 0xa0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000b740)=[{{0x0, 0x0, &(0x7f00000029c0)=[{&(0x7f0000001880)=""/93, 0x5d}], 0x1}}], 0x1, 0x0, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='gre0\x00', 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/dev\x00') preadv(r2, &(0x7f00000017c0), 0x3a8, 0x0) 21:03:56 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0xeb805cc4}}, 0x10, 0x0}, 0x0) 21:03:56 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 21:03:56 executing program 1: syz_emit_ethernet(0x66, &(0x7f0000000000)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaaaa86dd60766051003094b43a305acd0308dcbdf8c5aa3afffe0dff28f5000300008800000000000000000001860090780007000060c5961e0000000005010000000000001803000005000001ff0500"], 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x20000, 0x0) fchdir(r0) 21:03:56 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x6b6b6b00000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:56 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0xfeffffff00000000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:57 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0xffffff7f}}, 0x10, 0x0}, 0x0) 21:03:57 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0xfffffffffffff000, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:57 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x1, 0x5c1000) ioctl$BLKBSZGET(r1, 0x80081270, &(0x7f0000000200)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r3, 0x0) r4 = socket(0x1e, 0x1, 0x0) getsockopt(r4, 0x800000010f, 0x81, &(0x7f00004ad000), &(0x7f0000a3c000)=0xfffffffffffffc40) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r4, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x7178772033f29c4}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="00022bbd7000ffdbdf25060000002c000100080009003a000000080004004e22000008000b0073697000080004004e220000080001000a0000003000020014000100fe8000000000000000000000000000aa08000400ff00000008000500bf00000008000700090000000800050001000080"], 0x78}, 0x1, 0x0, 0x0, 0x10}, 0x10) 21:03:57 executing program 0: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x2, 0x10, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x6e6bb7, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in=@loopback}}]}, 0x50}}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={r0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getgid() setgroups(0x3, &(0x7f0000000400)=[r3, r4, r5]) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40408}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x9c, r6, 0x4, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7fffffff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x100}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x14fffc0440cff0b5}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x80000001}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xfffffffffffffe00}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7f}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x94}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xed}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8000}]}, 0x9c}, 0x1, 0x0, 0x0, 0x40}, 0x8000) r7 = add_key(&(0x7f0000000440)='cifs.idmap\x00', &(0x7f0000000480)={'syz', 0x2}, &(0x7f00000004c0)="12cb203e69810084a97c67a1c0466dc36101ee04c8c4d170bad1f6240a557b931e179a4ffd14077a16e132c11d0a547929f6a51308336ff34bd889346b07b943855b004944e2b0235a4de1d96e75f9c098b01fc5336ae70736368e8f4026a9e91dedc06aca912bfcce333858da6504db3f56b81351960df8f1f6f8b1064a6a85bf822669c5e69bfb59009742e714ec9ed89d7c049fbc0d2ecdcc7ef5d679d32bc02ebb654bdb730635053d17007cb1c2a6658ede", 0xb4, 0xfffffffffffffff9) r8 = add_key(&(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, &(0x7f0000000600)="37614005be82f48e9092f3b0d776dd2c6562da3464306b7fd70f51b349fbda833337a09bd8088ee556895b0bddc9b2a00a7df456980dea11c15077613ce20abcdd9c90bb638802528cd9d99a7b61c4b15ebb15d2e3497592489b8048db529e2d7a4f71a29c2be73cfdab548b34ca9188741c197f59f0407876711df0bf11b2192fbc9071e4024de4e02aaca5c2d21b82bd8e3407cc2a14d556cb5b4965a26724626a0a05a5b951f0d435cbfe4203d291628393e06d2e530514e9d7b53cdffb50d3d9388cc23ca9d3b724fc901c488665202ecc0d9ba0e5bf740fd4db", 0xdc, 0xffffffffffffffff) r9 = add_key(&(0x7f0000000700)='id_resolver\x00', &(0x7f0000000740)={'syz', 0x0}, &(0x7f0000000780)="85767676436e7eae2d8e70f0b7639943cb86b3b7effce338a2194976d9c9d8e5875526d5c21983087def4142b34a3a2da64827746be0d9225881ea697ddd67f583eee4b525c28002c99f8be24a51792c8d1f067cfd08faad3d5191f358f77ceb4c445b067b2a6277c0df860faf1bc754db4fdfb21ef2738c13df83fd9935ad688a40de56368d7db2df5c9db6c677cc81322323", 0x93, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000840)={r7, r8, r9}, &(0x7f0000000880)=""/4096, 0x1000, &(0x7f00000019c0)={&(0x7f0000001880)={'xcbc(blowfish-generic)\x00'}, &(0x7f00000018c0)="5e4e7a74908b16c35b941f1ad55c381a8675608138d7688b2333e006bd1ab3c423a19e34e75749ab27f10a25302ad3da07443f4605c105d40168df4040a3d347fa9c42065c3996de39423ec260dd4dda39fa3457c9b377f5144ae945870ae079eeb2263d3103a54b98c80d833c6075a7de94ba5b3d221c69344b9953eb55e3cfe4005d6277a175628cf5e3e2f0e6508772c6bb16de0b69e90c9402e87216df607081671a3f84cc8462d64e4f63ff3dfa05f1e2d8eb9b47a29a3ddb1714e5320f7d564f764c860d7d40f4327c5956c7d99b13eb3f1a9a9e632c0329aef876a7c4b47b5b05271a04f2e54c", 0xea}) r10 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x0, 0x2) ioctl$TUNSETSNDBUF(r10, 0x400454d4, &(0x7f0000001a00)=0x29) ioctl$TUNGETVNETHDRSZ(r10, 0x800454d7, &(0x7f0000000080)) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0x6d, 0x0, &(0x7f00000002c0)) 21:03:57 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 21:03:57 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:57 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x2, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:57 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 21:03:57 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x4000000000000}}, 0x10, 0x0}, 0x0) 21:03:57 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:57 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) writev(r0, &(0x7f00000000c0), 0x1000000000000148) 21:03:57 executing program 1: pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0xba57144dc6e57761) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) 21:03:57 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x3, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:57 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x100000000000000}}, 0x10, 0x0}, 0x0) 21:03:57 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 21:03:57 executing program 0: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x2, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:57 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) writev(r0, &(0x7f00000002c0)=[{&(0x7f00000000c0)="2d3ff44930d853d8447edff2dcbc01a078175fba08b0207a521cac089ed547ee63cc395f412097abf286ebd94f21ac71bfd2d1d0cf349ba398cfd1b1a1f46bf48db1c7b26fb4d0c013b6ad8b41147f1168bdcd2b33f0ed4aa2a9d405ea6f11d31dab3a3c7c1a84e037c6268130c0c506493fb43d9b4cb5bc1d8ccae994357228318d5db93ef49b3bc85a3ae2a670ea466fb98be2b7c108477faba5ce6091b4f11f1ad8b75cd6e086de3f31e4933c3949e11aac6f0fea48c69dbb1bece3ece4d028", 0xc1}, {&(0x7f00000001c0)="c623aab11fac475991d8eab51a22671b8aa3835058961cfe592c0cbb5eca581205a2b7fbfb7b9b7c49764c5dbb7ce7be6f43f6c649121b7b11e0fdae4624ab6d3b7a5724633ffceebbafe2adddbcc306db6ce013bc6dfa9950da3cadb748b3c5e267e7997eecce849054cf5a5c5da9506193d185e602c2b6dd8106d50a4bec98839cfe082c2d830be1fbc16efd6a6fc0771a260d821a6f378aa9681516267ad467ea9f0ca14b32621400936f16a744c09fadeb1e61c12b7a57a2e0479645053fee", 0xc1}], 0x2) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r2, &(0x7f0000005fc0), 0x800000000000059, 0x0) 21:03:57 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x4, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:57 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) socketpair$unix(0x1, 0x801, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2000000000012}, &(0x7f0000044000)) timer_settime(0x0, 0x3, &(0x7f000006b000)={{0x0, 0x8}, {0x77359400}}, 0x0) tkill(r5, 0x1000000000016) ioctl$SIOCX25SENDCALLACCPT(r2, 0x89e9) write$P9_RWSTAT(r1, &(0x7f0000000080)={0x7}, 0x7) 21:03:57 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:57 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x6, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:57 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 21:03:57 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x300000000000000}}, 0x10, 0x0}, 0x0) 21:03:57 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:57 executing program 1: bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) socket$inet(0x2b, 0x1, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x1, 0x0) sched_setaffinity(r2, 0xa64, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) lsetxattr$security_selinux(0x0, &(0x7f00000002c0)='security.selinux\x00', 0x0, 0xfffffffffffffdc1, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000700)={{{@in=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f00000006c0)=0xfffffffffffffd5f) ioctl$SIOCAX25ADDUID(r1, 0x89e1, &(0x7f00000001c0)={0x3, @bcast, r4}) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r3, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x34, r5, 0x10, 0x70bd25, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x589}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2e7}]}, 0x34}, 0x1, 0x0, 0x0, 0x40}, 0x20000014) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) 21:03:57 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 21:03:57 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x7, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:03:57 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x3f00000000000000}}, 0x10, 0x0}, 0x0) 21:03:58 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x500000000000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:03:58 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) [ 543.272382] net_ratelimit: 22 callbacks suppressed [ 543.272390] protocol 88fb is buggy, dev hsr_slave_0 [ 543.272426] protocol 88fb is buggy, dev hsr_slave_1 [ 543.277438] protocol 88fb is buggy, dev hsr_slave_1 21:04:00 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) syz_open_pts(r0, 0x100) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0xc72f, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(0xffffffffffffffff, 0x6430) ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000000400)={0x0, 0x0, 0x200000000001d, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "77100b6a1cc076a15ad9f0552d5b12bfc338e5269b12ac2a4ee4202c64122b0a"}}) set_tid_address(&(0x7f0000000000)) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f00000001c0)) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, 0x0, 0x40100, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r0, 0xc0945662, 0x0) 21:04:00 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x8, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:00 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x66da421500000000}}, 0x10, 0x0}, 0x0) 21:04:00 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) vmsplice(r0, &(0x7f0000000100)=[{&(0x7f0000000040)="9b5d518af0f9bc665c59851856529056408b7436eef989036f819affb6347f893204a9bf1a377a4074050c76e34c64ef8b7eeabbf591f8f65f9d33943d1bcc1aaec91b7df282bf42011c3594c9d9d3018d73aca3afe2829c5734243a9cf00581990defda2a1d67839fe2d796ecdbc53976b904a7e9e725564b0d91e3c10e0f275f51b7f554213ca448f12d8fb0926cdb6759382712d7ef0adc80", 0x9a}, {&(0x7f0000000180)="0298eae1c4491b5fcc6bd6d48341e8032e15c90ffef858dc69f68b3681a08710559bac71f78f0c78dfafd886fb5c262f390129e03cc4ea6c21e3def7d2e42507b64c54e5a06819b3bb3fe0660377fca2d91eeb060199727292d67db3d4a1f6e80a0a5baa780b112ce8da83334d2f5d46", 0x70}, {&(0x7f0000000240)="146fc53c2afc9a0899bf6e85abc669389a012a22220c5b4b2fe9d83ddffecbc48f71f2af767b2e899aa63624da6d3d4576dd89821103f9116828ea4b8619e8fe3847ccca97af0a13dda961b40775df23f9aadec5f6ec2a82079525526fe66ecc8f0b726a37dec783fbe053fac94f088ae53e135ad7850ce0e36f5f65402230f68b", 0x81}, {&(0x7f0000000300)="35ec7d8b794b0716439647282b352894cb6ffc3f9bdae405e3d7ef36cad1a6a0e5275060c97e8b4b86be610c07943d2d5d866caa8b4259f97b154dd1d9c3c860f0870aa3ace99e33344148485b65979fdefa63e7f43ff6890375b0522dbd096e3a777447106e09f7cb473dafa7e385de05becc69628b0349b4d7b8fb0f4a11d60497733c907f41bba6270fb76297f34da11c25e85c6bf7ca75a203b83f20e3607b00b1a8e5ab85dc507f1833da65e57c58c5acf74a95cdd132cba8f5d96de365da7ac710b61c07b675e1b3845b8ad2bdc45316666d62c2b80797cc20ae6ee0ccbf80f09a03a295dc87ef70a0d038cb8ca2b2", 0xf2}], 0x4, 0x9) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000600)='net/fib_trie\x00') r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000680)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f0000000740)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x410000}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x1c, r2, 0x200, 0x70bd25, 0x25dfdbfb, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x40094) fcntl$setlease(r1, 0x400, 0x2) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000480)={0x2, 0x4e23}, 0x10) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000540)='/dev/dlm-control\x00', 0x204000, 0x0) ioctl$VIDIOC_SUBDEV_G_EDID(r3, 0xc0285628, &(0x7f00000005c0)={0x0, 0x6, 0x1, [], &(0x7f0000000580)}) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='lp\x00', 0x3) r4 = syz_open_dev$adsp(&(0x7f00000004c0)='/dev/adsp#\x00', 0x6, 0x2000) read$alg(r4, &(0x7f0000000500)=""/20, 0x14) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000780)={0x800, 0x0, 0x1, 0x400}) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000800)={0xee2, r5}) bind(r0, &(0x7f0000000400)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-sse2\x00'}, 0x80) ioctl$VIDIOC_S_PRIORITY(r4, 0x40045644, 0x3) 21:04:00 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 21:04:00 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x600000000000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) [ 544.140800] __ntfs_error: 86 callbacks suppressed [ 544.140812] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. 21:04:00 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) [ 544.187520] ntfs: (device loop5): read_ntfs_boot_sector(): Could not find a valid backup boot sector. [ 544.199379] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. 21:04:00 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0xb, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:00 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0xc45c80eb00000000}}, 0x10, 0x0}, 0x0) [ 544.234603] protocol 88fb is buggy, dev hsr_slave_0 [ 544.241018] protocol 88fb is buggy, dev hsr_slave_1 21:04:01 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f00000002c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x5ba30aed6f27f4ea, 0x0) fstat(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getgid() write$FUSE_ATTR(r1, &(0x7f00000001c0)={0x78, 0xfffffffffffffff5, 0x3, {0x3, 0x9b, 0x0, {0x4, 0x3, 0x40, 0x3, 0x9, 0x2, 0x5, 0x5964, 0x8000, 0x3, 0x7, r2, r3, 0xe4f, 0x10000}}}, 0x78) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000300)={{0x80}, 'port1\x00', 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}) [ 544.335120] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 544.370788] ntfs: (device loop5): read_ntfs_boot_sector(): Could not find a valid backup boot sector. 21:04:01 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x9, &(0x7f0000000040)={r0, 0x16, 0x1, 0x0, 0x0}, 0x20) 21:04:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffa}, 0x0, 0x8) r1 = gettid() ioctl$FIBMAP(r0, 0x1, &(0x7f0000000000)=0x20) timer_create(0x9, &(0x7f0000000240)={0x0, 0x30, 0x4, @tid=r1}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000480)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f00000004c0)) 21:04:01 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0xd, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 544.392355] protocol 88fb is buggy, dev hsr_slave_0 [ 544.392401] protocol 88fb is buggy, dev hsr_slave_1 [ 544.397450] protocol 88fb is buggy, dev hsr_slave_1 [ 544.407573] protocol 88fb is buggy, dev hsr_slave_0 [ 544.412680] protocol 88fb is buggy, dev hsr_slave_1 [ 544.423351] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. 21:04:01 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:01 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 21:04:01 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0xd001010000000000}}, 0x10, 0x0}, 0x0) 21:04:01 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x4, &(0x7f0000fef000/0x2000)=nil) 21:04:01 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="8c"], 0x1) [ 544.647395] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. 21:04:01 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x10, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 544.742057] SELinux: failed to load policy 21:04:01 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 21:04:01 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0xffffff7f00000000}}, 0x10, 0x0}, 0x0) 21:04:01 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000300)={{0xa, 0x4e20, 0x20, @ipv4={[], [], @multicast2}, 0x1}, {0xa, 0x7fffffff, 0x8, @local, 0x7f}, 0x4, [0x800000000000000, 0x80000000, 0x6, 0x7, 0xffff, 0x2, 0x88, 0x4]}, 0x5c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x202}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x110, r1, 0x200, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xfffffffffffffff9}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14}]}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x6}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bcsh0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x80000000}]}, @IPVS_CMD_ATTR_DEST={0x40, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7fffffff}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@local}]}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x6ed}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}]}, 0x110}, 0x1, 0x0, 0x0, 0x24000001}, 0x40014) socket$can_raw(0x1d, 0x3, 0x1) [ 544.767669] ntfs: (device loop5): read_ntfs_boot_sector(): Could not find a valid backup boot sector. [ 544.800274] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. 21:04:01 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x14, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:01 executing program 0: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2203, &(0x7f0000000040)=ANY=[@ANYBLOB="000000545de2c6fb02000000c163e54517b60b89c34739d1ff15f335e5f5284926ea6e9469725bf792f2de4f5080a141fde4d28047c357adefc1c2ae4b712cf5adbfb1f576f9f830f5ebf65a9e7d3e63a0c72d45c0d8c51144abe0a2194b00000000000000673a931fb15db80ae4dba94406a885ad9770aede"]) ioctl$SG_SET_COMMAND_Q(r0, 0x2271, &(0x7f0000000000)) [ 544.931040] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. 21:04:01 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 21:04:01 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x800000000000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:01 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x18, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:01 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x3}}, 0x10, 0x0}, 0x0) 21:04:01 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x14, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket(0x200040000000015, 0x805, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000000)={r1}) getsockopt(r1, 0x114, 0x271d, 0x0, &(0x7f000033bffc)) 21:04:01 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 21:04:01 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x26, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:01 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000), 0x1}, 0x0) 21:04:01 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x900000000000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:02 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x4}}, 0x10, 0x0}, 0x0) 21:04:02 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x28, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:02 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0xa344, 0x2080) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000040)=0x1) io_setup(0xf4, &(0x7f0000000180)=0x0) io_submit(r2, 0x1, &(0x7f0000001e00)=[&(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x300}]) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f00000001c0)={0x0, 0xf0, "e3b9601dcce23a8f66cc588015eb2bf03ed2294e9a26245a484db091969bba33013b78687b96ab5731494b7e71e1d1b3bd6145475a396581d4f5636be50f1371184b122ac73f4fd36e565534a8fefb09a5b6202a8dc3caddc11882c0b7da3a688b9d7840459e40f10ff5d9e451919976b71c56f643cffe6182d17f69a3f1b95ee9b59edfd149cb02a612f2e3c35b7e67232792b9f7cd73739bcd1e95cc1e9ce98141a30ac77e9bd8e4e3b7e7abaa4ff3c1e401178a54d602188c39e4d6e1583a3b00fc1e328bdf8e91cc61f26570d53194fcca4429102ccc98c52cd5a8b5b8e929a0fc0700309c80d32ef5b91ad634b3"}, &(0x7f0000000140)=0xf8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f00000002c0)={r3, 0xf9, "1097a262faa61a83d6b8df79c9173bd4e6deecb2b10b309722bf24bed131449e1bf1743151c9b29d98cbf6b5b4860cfa4eb0195a3f3e76f9b880094f9d749770fa6e75fba8b2ea8d7b56b452fb80b8f2371cfc13cd46225818a5c008e712434320b335aa72eb94b9d46f2c41ca7e7b316f39a36df60c204d9d47e0e66b934a5323841e6d65440c2a4b8c25b92814d461db1f7942672a562c00139f9856e1ed7cf52110412d557a39fa8d6047de942ca9c2c1009fde421794c26689e5d08b6fb2286989a4333b01fba1b60b7545a84d90b0256ec5a830ba1801432d0f91e4bbc1b3cde3668739feb2dcaceeab24393eae76768bba557ae49350"}, &(0x7f0000000400)=0x101) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r1, 0x800443d3, &(0x7f0000000080)={{0x0, 0x5, 0xffffffffffffffff, 0x2, 0x4, 0xfffffffffffffffe}, 0x3d, 0x9, 0x7fff}) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) write$input_event(r1, &(0x7f0000000100)={{r4, r5/1000+30000}, 0x5, 0x401, 0x40}, 0x18) 21:04:02 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 21:04:02 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0xa0800, 0x0) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000080)={'bond_slave_1\x00', 0x4}) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) close(r1) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x4) 21:04:02 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0xa00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:02 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x300}}, 0x10, 0x0}, 0x0) 21:04:02 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x60, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:02 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 21:04:02 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x1c, &(0x7f0000000140)=[@in6={0xa, 0x0, 0x0, @loopback}]}, &(0x7f0000000100)=0x10) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r2, &(0x7f0000000180)=@alg, &(0x7f0000000200)=0x80, 0x800) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x84, r4, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xc9}]}, @TIPC_NLA_BEARER={0x4}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_NET={0x54, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x762e}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xd8}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x4000}, 0x72a668f5b9e4190d) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0xd, &(0x7f0000000000)={r1}, &(0x7f00000000c0)=0x8) r5 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r5, 0x10e, 0x2, &(0x7f0000000080)=0x2, 0x4) 21:04:02 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x3f00}}, 0x10, 0x0}, 0x0) 21:04:02 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x10000, 0x0) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f0000000040)=0x4) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x10000, 0x7d035a0fe3315ef1) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f00000000c0)=""/57, &(0x7f0000000100)=0x39) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={[], [], @empty}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) sendmsg$xdp(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x2c, 0x1, r2, 0x1f}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000380)="0bf54517d35b673c4db13c012c229a3a57d1010027e9b4", 0x17}], 0x1, 0x0, 0x0, 0x20000000}, 0x20000014) r3 = accept4$ax25(r1, &(0x7f0000000440)={{0x3, @null}, [@default, @rose, @netrom, @remote, @netrom, @bcast, @remote, @rose]}, &(0x7f00000004c0)=0x48, 0x800) socket$inet6(0xa, 0x4, 0x2) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x27}, 0x3}}, 0x0, 0x3, 0x0, "2806ef0165a71bf403d3593d66ec260d08d11148f41e9b605ffe9293c8f52f0ee2dd98be28f9b767c5055f0117fd9c66ab3bcda0c969c6e74473b73d0f8748a8ff6257d756ac3954bee0cde0876d2aa0"}, 0xd8) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000600)={0x0, 0xff, 0x11, 0x6, 0x2, 0xffffffffffffffff, 0x9}, 0xc) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000640)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@local, @in=@broadcast}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000780)=0xe8) r4 = openat$selinux_create(0xffffffffffffff9c, &(0x7f00000007c0)='/selinux/create\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000800)=r0) ioctl$sock_inet_SIOCSIFBRDADDR(r3, 0x891a, &(0x7f0000000840)={'caif0\x00', {0x2, 0x4e21, @multicast1}}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000880)={{{@in=@dev, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000980)=0xe8) ioctl$BLKBSZGET(r4, 0x80081270, 0xfffffffffffffffd) r5 = getpgrp(0xffffffffffffffff) mq_notify(r0, &(0x7f00000009c0)={0x0, 0x1b, 0x2, @tid=r5}) accept$ax25(r0, &(0x7f0000000a00)={{}, [@bcast, @netrom, @rose, @rose, @default, @default, @default, @default]}, &(0x7f0000000a80)=0x48) clock_gettime(0x0, &(0x7f0000003740)={0x0, 0x0}) recvmmsg(r0, &(0x7f00000035c0)=[{{&(0x7f0000000ac0)=@ipx, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000b40)=""/246, 0xf6}, {&(0x7f0000000c40)=""/117, 0x75}, {&(0x7f0000000cc0)=""/28, 0x1c}, {&(0x7f0000000d00)=""/223, 0xdf}], 0x4}, 0xa54d}, {{&(0x7f0000000e40)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f0000001400)=[{&(0x7f0000000ec0)=""/251, 0xfb}, {&(0x7f0000000fc0)=""/69, 0x45}, {&(0x7f0000001040)=""/186, 0xba}, {&(0x7f0000001100)=""/213, 0xd5}, {&(0x7f0000001200)=""/20, 0x14}, {&(0x7f0000001240)=""/178, 0xb2}, {&(0x7f0000001300)=""/213, 0xd5}], 0x7, &(0x7f0000001480)=""/254, 0xfe}, 0xdd}, {{&(0x7f0000001580)=@caif=@dbg, 0x80, &(0x7f0000001640)=[{&(0x7f0000001600)=""/61, 0x3d}], 0x1, &(0x7f0000001680)=""/25, 0x19}, 0x20}, {{&(0x7f00000016c0)=@caif=@rfm, 0x80, &(0x7f0000001c80)=[{&(0x7f0000001740)=""/251, 0xfb}, {&(0x7f0000001840)=""/251, 0xfb}, {&(0x7f0000001940)=""/229, 0xe5}, {&(0x7f0000001a40)=""/230, 0xe6}, {&(0x7f0000001b40)=""/168, 0xa8}, {&(0x7f0000001c00)=""/107, 0x6b}], 0x6, &(0x7f0000001d00)=""/82, 0x52}, 0xfffffffffffffff9}, {{&(0x7f0000001d80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000003340)=[{&(0x7f0000001e00)=""/180, 0xb4}, {&(0x7f0000001ec0)=""/113, 0x71}, {&(0x7f0000001f40)=""/4096, 0x1000}, {&(0x7f0000002f40)=""/171, 0xab}, {&(0x7f0000003000)=""/146, 0x92}, {&(0x7f00000030c0)=""/98, 0x62}, {&(0x7f0000003140)=""/237, 0xed}, {&(0x7f0000003240)=""/119, 0x77}, {&(0x7f00000032c0)=""/60, 0x3c}, {&(0x7f0000003300)=""/34, 0x22}], 0xa, &(0x7f0000003400)=""/172, 0xac}, 0x9}, {{&(0x7f00000034c0)=@ll, 0x80, &(0x7f0000003580)=[{&(0x7f0000003540)=""/39, 0x27}], 0x1}, 0x5}], 0x6, 0x2, &(0x7f0000003780)={r6, r7+30000000}) getsockopt$MISDN_TIME_STAMP(r8, 0x0, 0x1, &(0x7f00000037c0), &(0x7f0000003800)=0x4) ioctl$UI_GET_VERSION(r0, 0x8004552d, &(0x7f0000003840)) r9 = syz_genetlink_get_family_id$SEG6(&(0x7f00000038c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000039c0)={&(0x7f0000003880)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000003980)={&(0x7f0000003900)={0x54, r9, 0x200, 0x70bd29, 0x6, {}, [@SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_DST={0x14, 0x1, @dev={0xfe, 0x80, [], 0x28}}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={[], [], @loopback}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x9e}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfe}]}, 0x54}}, 0x4) set_mempolicy(0x3, &(0x7f0000003a00)=0x1, 0x8) dup(r0) ioctl$SG_SET_DEBUG(r0, 0x227e, &(0x7f0000003a40)) ptrace$setsig(0x4203, r5, 0xc41a, &(0x7f0000003a80)={0x19, 0x40c, 0xffffffffffffff41}) 21:04:02 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0xf0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:02 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x1000000000000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:02 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 21:04:02 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x101d0}}, 0x10, 0x0}, 0x0) 21:04:02 executing program 0: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x85, 0xc0000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='vmnet1wlan0proc,\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000008600)=[{{0x0, 0x27f, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x300, &(0x7f0000000600)}}], 0x2, 0x0) 21:04:02 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x300, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:02 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x110e000000000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:02 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x1, 0x2800) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0xcc, r1, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_DAEMON={0x78, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'eql\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x18}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_DEST={0x20, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@local}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}]}, 0xcc}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x5, 0x209e1e, 0x3, 0x1}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r2, &(0x7f0000000b80), 0x0}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r0, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x8, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x6, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x3, 0x3, 0xffffffff00000001, 0x3}, &(0x7f0000000380)=0x20, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x81}}, 0x10) 21:04:02 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x40000}}, 0x10, 0x0}, 0x0) 21:04:02 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 21:04:02 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xe, 0x4, 0x4, 0x3}, 0x3c) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r0, 0xc0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x7fff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x6, 0x4}, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x9, 0x4, 0x1}, &(0x7f0000000100)=0xffffffffffff3c5b, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x4}}, 0x10) bpf$MAP_CREATE(0x4, &(0x7f0000003000)={0x3, 0x0, 0x0, 0x0, 0x10020000000, 0x0}, 0x2c) 21:04:02 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x1f00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:02 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x3e8, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:03 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1000000}}, 0x10, 0x0}, 0x0) 21:04:03 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) setsockopt$IP_VS_SO_SET_DEL(r2, 0x0, 0x484, &(0x7f0000000380)={0x3a, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e23, 0x2, 'lc\x00', 0x4, 0x7, 0x53}, 0x2c) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x378}], 0x100000c7, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000340)={0x64, 0x0, &(0x7f0000000280)=[@reply={0x40406301, {0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x58, 0x18, &(0x7f0000000200)={@ptr={0x70742a85, 0x0, &(0x7f0000000040)=""/132, 0x84, 0x1, 0x1b}, @flat=@weak_binder={0x77622a85, 0xa, 0x3}, @fd={0x66642a85, 0x0, r3}}, &(0x7f0000000100)={0x0, 0x28, 0x40}}}, @increfs_done, @enter_looper, @increfs={0x40046304, 0x2}], 0x3d, 0x0, &(0x7f0000000300)="d4c0703a63d460934b96546e945b23aee1fd1c6dca27ac2d68f2ef676b2c3c5e92643861837a302df310fa94ced8ae9f1550e33ba7ce9cf03a6fd7bfde"}) ioctl$sock_inet_SIOCDELRT(r3, 0x890c, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') setsockopt$sock_void(r4, 0x1, 0x24, 0x0, 0x0) preadv(r4, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) 21:04:03 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x543, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553f702efb42338b0b7fc9ec94248c", 0x10) r1 = shmget(0x1, 0x2000, 0x2, &(0x7f0000ffe000/0x2000)=nil) shmctl$SHM_LOCK(r1, 0xb) socket$alg(0x26, 0x5, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) 21:04:03 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 21:04:03 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x3000000}}, 0x10, 0x0}, 0x0) 21:04:03 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x2000000000000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:03 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x600, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:03 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 21:04:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts_ecb(cipher_null))\x00'}, 0x58) arch_prctl$ARCH_GET_CPUID(0x1011) 21:04:03 executing program 1: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000001180)='threaded\x00', 0xfc9a) fallocate(r0, 0x11, 0x2001, 0x9000000) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000100)='.', 0x1}], 0x1) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@timestamp, @timestamp], 0x2) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 21:04:03 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1542da66}}, 0x10, 0x0}, 0x0) 21:04:03 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x2200000000000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:03 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x608, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:03 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x4) 21:04:03 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x3f000000}}, 0x10, 0x0}, 0x0) 21:04:03 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x9) 21:04:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40000, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r1, 0xc008551a, &(0x7f0000000080)={0x4, 0x10, [0x6, 0xfffffffffffffff4, 0xff4, 0xffff]}) r2 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000100)={@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}, 0x0, 0x2, 0x0, 0x6}, 0x20) write$P9_RFSYNC(r1, &(0x7f0000000200)={0x7, 0x33, 0x2}, 0x7) name_to_handle_at(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={0x4a, 0xfffffffffffffc01, "463a58666374812d6a3ba379ee4519001e3126353091bc1af6cb7a976991ae3fa0c4183fc97c795edc9eb6482f0319cf69986e4e269706d70d66c2e0bcd3b231f447"}, &(0x7f00000001c0), 0x400) 21:04:03 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x8000000000006, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xffe3}, 0xfffffee2) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x3f, 0x2000) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000080)={0x3f, 0xc43, 0x3, 0x0, 0x17, 0x200, 0x0, 0x6, 0x9, 0x279, 0x0, 0xfffffffffffff3e1}) r2 = syz_open_pts(r1, 0x80000) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0x12}) 21:04:03 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x689, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:03 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x2c00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:03 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x66da4215}}, 0x10, 0x0}, 0x0) 21:04:03 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x3f00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:04 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0xc) 21:04:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'rmd160-generic\x00'}, 0x58) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f0000000100)=0x4000000) recvmmsg(r1, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000001c0)}], 0x1, &(0x7f0000000240)=""/63, 0x3f}, 0x7}, {{&(0x7f0000000280)=@x25, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000300)=""/143, 0x8f}], 0x1}, 0x9}, {{&(0x7f0000000400)=@rc, 0x80, &(0x7f0000000580)=[{&(0x7f0000000480)=""/228, 0xe4}], 0x1, &(0x7f00000005c0)=""/220, 0xdc}}, {{&(0x7f00000006c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000740)=""/143, 0x8f}, {&(0x7f0000000800)=""/81, 0x51}, {&(0x7f0000000880)=""/164, 0xa4}, {&(0x7f0000000940)=""/20, 0x14}, {&(0x7f0000000980)=""/94, 0x5e}, {&(0x7f0000000a00)=""/251, 0xfb}, {&(0x7f0000000b00)=""/249, 0xf9}], 0x7, &(0x7f0000000c80)=""/103, 0x67}, 0x3c66}, {{&(0x7f0000000d00)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000000e40)=[{&(0x7f0000000d80)=""/136, 0x88}], 0x1}}, {{&(0x7f0000000e80)=@rc, 0x80, &(0x7f0000001240)=[{&(0x7f0000000f00)=""/195, 0xc3}, {&(0x7f0000001000)=""/23, 0x17}, {&(0x7f0000001040)=""/15, 0xf}, {&(0x7f0000001080)=""/31, 0x1f}, {&(0x7f00000010c0)=""/88, 0x58}, {&(0x7f0000001140)=""/199, 0xc7}], 0x6, &(0x7f00000012c0)=""/4096, 0x1000}, 0x400}], 0x6, 0x2, 0x0) r2 = accept$alg(r0, 0x0, 0x0) fcntl$getflags(r0, 0xb) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0xf0ff7f, 0x0, &(0x7f0000002a80), 0x261, &(0x7f0000000080)=[@op={0x18, 0x117, 0x2}], 0x18}], 0x4924944, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r1, 0x2287, &(0x7f0000000140)=0xb395) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000180)={0x2, 0x2}) 21:04:04 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x700, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:04 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x806, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:04 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:04 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0xc45c80eb}}, 0x10, 0x0}, 0x0) 21:04:04 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x400000, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000000c0), &(0x7f0000000100)=0xb) setuid(0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioprio_set$pid(0x2, 0x0, 0x0) 21:04:04 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x4, 0x400) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000003c0)={0x0, @in={{0x2, 0x4e24, @multicast1}}}, &(0x7f0000000480)=0x84) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000004c0)={r1, 0x2}, 0x8) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000040)=0x80100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) clone(0x6004000, &(0x7f00000000c0)="a876d2b78eaeaf9096ced6624117c76aa4174a7178b9345cd1c7aa44562feefe1d9aa39083af5215d005008934359dfcf40c6f29912ddf69a6f44721db01e851de4352516a0bc12cdfc6c88ea82e268482fc6382a32c6396fc3bce348af1bb19807c6acbb827f41d61dc2c7afdc1318e46b8a17748f813954f1d0afe16b6ddcf4787a32a5792c756900c284b84e3a97f87763e42596d0ce898be33d51efdc76d99c9e3ebf02a87dfe4bd04c6605a08f4b947b9e50052178452d29c7339194c7f2afbf7d00ce755abc17559027db65a1ec72a9ee594dc70e372005565", &(0x7f0000000000), &(0x7f00000001c0), &(0x7f0000000200)="d1788961227fc498b03cbf1aab4a1c7cd3a106c2292a0f30cbe6457888bed4952e458cf823b4066f7934fa89d90482558d440eac16dd4b473ad102336d6a526be0402365f29e04477810d8ec218b3e2be460580602bf548ba1ae4a358de1978bf0e7bbf68ee6284b458ec2fae1ed28241146fab87f8ce715ca50ffaf13069f85ec549be03dbbac97b56285208bff408a0fa540aeacd0254e4d51fa8b") r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/capi/capi20\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r3, 0x84, 0x12, &(0x7f0000000300)=0x2, 0x4) connect$rds(r3, &(0x7f0000000340)={0x2, 0x4e24, @local}, 0x10) prctl$PR_GET_SECUREBITS(0x1b) 21:04:04 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x900) 21:04:04 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0xd0010100}}, 0x10, 0x0}, 0x0) 21:04:04 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0xb00, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:04 executing program 0: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:04 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x4800000000000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:04 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0xd00, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:04 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0xeb805cc4}}, 0x10, 0x0}, 0x0) 21:04:04 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0xc00) 21:04:04 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x4c00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:04 executing program 0: r0 = openat$usbmon(0xffffffffffffff9c, &(0x7f0000000000)='/dev/usbmon0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x90, &(0x7f0000000100)=[@in6={0xa, 0x4e20, 0xfffffffffffffff9, @ipv4={[], [], @loopback}}, @in6={0xa, 0x4e21, 0x1, @dev={0xfe, 0x80, [], 0x23}, 0xfff}, @in6={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0xa}, 0xfffffffffffffff9}, @in={0x2, 0x4e24, @loopback}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1e}}, @in6={0xa, 0x7, 0x3af3, @dev={0xfe, 0x80, [], 0x1e}, 0xfc000}]}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000240)={r1, @in6={{0xa, 0x4e23, 0x3ff, @dev={0xfe, 0x80, [], 0xb}, 0x20}}, 0x240000000000, 0x6, 0xf4e, 0x1000, 0x40}, &(0x7f0000000300)=0x98) r2 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x100000000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f0000000340)={0x3, 0x8001, 0x5, 0x3ff, 0x2, 0x7}) close(r0) r3 = msgget(0x0, 0x20) msgctl$IPC_INFO(r3, 0x3, &(0x7f00000003c0)=""/229) 21:04:04 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0xe80, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:05 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@gettaction={0x20, 0x32, 0x301, 0x0, 0x0, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x0, 0x2}}]}, 0x20}}, 0x40004) 21:04:05 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x101d0) 21:04:05 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_emit_ethernet(0x45, &(0x7f0000000040)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "08de06", 0x38, 0x3a, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x3a, 0x0, @loopback={0xff00000000000000}, @loopback, [], "fca967e17f791010"}}}}}}}, 0x0) 21:04:05 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0xffffff7f}}, 0x10, 0x0}, 0x0) [ 548.392340] net_ratelimit: 15 callbacks suppressed [ 548.392349] protocol 88fb is buggy, dev hsr_slave_0 [ 548.402636] protocol 88fb is buggy, dev hsr_slave_1 21:04:05 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x6000000000000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:05 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x4000000000000}}, 0x10, 0x0}, 0x0) 21:04:05 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x800, 0x0) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000040)=0x5) r1 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r2 = dup(r1) accept$inet6(r2, 0x0, 0x0) [ 548.552361] protocol 88fb is buggy, dev hsr_slave_0 [ 548.552375] protocol 88fb is buggy, dev hsr_slave_0 [ 548.557615] protocol 88fb is buggy, dev hsr_slave_1 [ 548.562806] protocol 88fb is buggy, dev hsr_slave_1 [ 548.573033] protocol 88fb is buggy, dev hsr_slave_0 [ 548.578113] protocol 88fb is buggy, dev hsr_slave_1 21:04:05 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x100000000000000}}, 0x10, 0x0}, 0x0) 21:04:05 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x1400, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:05 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x40000) 21:04:05 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) r1 = request_key(0x0, &(0x7f0000000480)={'syz', 0x0}, 0x0, 0xfffffffffffffffc) keyctl$negate(0xd, r1, 0xc6f, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_smack_transmute(r0, 0x0, &(0x7f0000000080)='TRUE', 0x4, 0x3) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="22e07700"], 0x10}}, 0x0) 21:04:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0xc}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000300)=0xfffffffffffffffa, &(0x7f0000000340)=0x4) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x40000, 0x0) ioctl$EVIOCGBITSW(r2, 0x80404525, &(0x7f0000000140)=""/71) sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="58000080", @ANYRES16=r1, @ANYBLOB="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"], 0x158}, 0x1, 0x0, 0x0, 0x1}, 0x800) 21:04:05 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x6800000000000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:05 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x1800, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:05 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x300000000000000}}, 0x10, 0x0}, 0x0) 21:04:05 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x1000000) 21:04:05 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000001c0)={0x0, 0x80000}) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000240)={r1, 0x80000, r2}) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000280)=0x2, 0x4) r3 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) getsockname$unix(r3, &(0x7f00000000c0), &(0x7f0000000140)=0x6e) ioctl(r2, 0x401, &(0x7f00000002c0)="11dca5055e0bcfe47bf070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r4, 0x89e2, &(0x7f0000000000)) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x9) 21:04:05 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x2000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:05 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x6c00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:05 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0xfff, 0xc0002) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x4e22, 0x3, @local, 0x8}, {0xa, 0x4e24, 0x3, @mcast1, 0x20000000000000}, 0x6, [0x0, 0x7, 0x8, 0x100000000, 0x6, 0x4, 0x5, 0x3]}, 0x5c) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x4e20, 0x44a0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1f}, {0xa, 0x4e20, 0x100000001, @dev={0xfe, 0x80, [], 0xf}, 0x4}, 0xfa5b, [0xfffffffffffffffe, 0x80, 0x1, 0x6, 0x200, 0x3, 0x1ff, 0x6]}, 0x5c) 21:04:05 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000000)="26640f48d16626660f388103660fc73366b8c70000000f23d80f21f86635000000900f23f8262e0f08f00fab9569fff4650fc734ba200066ed67dc5ca002", 0x3e}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0xfffffd69, 0x0, 0x0, 0x6d) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) preadv(r3, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$FUSE_INIT(r3, &(0x7f0000000300)={0x50, 0x0, 0x1}, 0x50) preadv(r3, &(0x7f00000001c0)=[{&(0x7f0000000180)=""/62, 0x3e}], 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) listxattr(&(0x7f00000005c0)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r3, &(0x7f0000000000)={0x10, 0xffffffffffffffda, 0x2}, 0x10) ioctl$KVM_RUN(r2, 0xae80, 0x0) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x20000, 0x0) accept4$inet(r5, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, &(0x7f0000000100)=0x10, 0x800) 21:04:05 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x3f00000000000000}}, 0x10, 0x0}, 0x0) 21:04:05 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x2600, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 549.144043] __ntfs_error: 77 callbacks suppressed [ 549.144054] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. 21:04:05 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x9000000) 21:04:05 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x2800, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 549.249105] ntfs: (device loop5): read_ntfs_boot_sector(): Could not find a valid backup boot sector. 21:04:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000200)='configfs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="2c6c068965726469723d2e3a6669536530996821446cca667aa243489469af22446a7242fbc4b6d545c8cbc43a86e54fb73d2258bec0df321e2cd199cd539b6dc3f9256e19b6f8a7e20e585278c8d4784f5913e2c4474a69730a6993eb2d8c450b8f1b94d515db02bc2180c3ffbd041924df404147f359cdd9597c3d6eac1c390d8d4c1c1d98e697d3978dda110c51e1e6cba881713874556e5b7713ea734328"]) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=@getqdisc={0x24, 0x26, 0x800, 0x70bd2c, 0x25dfdbfb, {0x0, 0x0, {0xffff, 0x4}, {0xf}, {0xf7319bd775ac9ba}}}, 0x24}}, 0x0) lstat(&(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740)) 21:04:06 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x66da421500000000}}, 0x10, 0x0}, 0x0) [ 549.309018] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. 21:04:06 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x3580, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 549.387154] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 549.418126] ntfs: (device loop5): read_ntfs_boot_sector(): Could not find a valid backup boot sector. 21:04:06 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0xc000000) [ 549.472796] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. [ 549.512376] protocol 88fb is buggy, dev hsr_slave_0 [ 549.512380] protocol 88fb is buggy, dev hsr_slave_0 21:04:06 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) clone(0x100000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000000040), 0x6cfd82a4528d429c, 0x0, 0x0}) [ 549.535929] overlayfs: unrecognized mount option "l‰erdir=.:fiSe0™h!DlÊfz¢CH”i¯"DjrBûĶÕEÈËÄ:†åO·="X¾Àß2" or missing value 21:04:06 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x7400000000000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:06 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0xc45c80eb00000000}}, 0x10, 0x0}, 0x0) 21:04:06 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x4000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 549.630760] overlayfs: unrecognized mount option "l‰erdir=.:fiSe0™h!DlÊfz¢CH”i¯"DjrBûĶÕEÈËÄ:†åO·="X¾Àß2" or missing value 21:04:06 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x17c0e45e) 21:04:06 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x4305, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:06 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000000c0)='./file0\x00', r2, 0x0) r3 = dup2(r0, r1) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="0200000002671bdb4bc8b7142e0c000000", @ANYRES32=r2, @ANYBLOB="040003000000050110000200000000002000000000000000"], 0x2c, 0x0) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) 21:04:06 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0xd001010000000000}}, 0x10, 0x0}, 0x0) [ 549.789644] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 549.791246] binder: 30211:30213 unknown command 1869770799 21:04:06 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x3c24ff8f) [ 549.896580] binder: 30211:30213 ioctl c0306201 20000000 returned -22 [ 549.916902] ntfs: (device loop5): read_ntfs_boot_sector(): Could not find a valid backup boot sector. 21:04:06 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x4788, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:06 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x0, {0x0, 0x0, 0x0, 0x4}, 0x4}, 0xe) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x40000, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)={0xcff02c07039dc6c4, 0x0, [0x6, 0x5, 0x20, 0xab0]}) connect$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x0, {}, 0x4, 0x80000001}, 0xe) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xb5cf, 0x4) 21:04:06 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0xffffff7f00000000}}, 0x10, 0x0}, 0x0) 21:04:06 executing program 1: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) r2 = syz_open_dev$sndctrl(0x0, 0xfffffffffffffffd, 0xc000) r3 = syz_open_dev$vbi(0x0, 0x2, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$l2tp(0x18, 0x1, 0x1) r4 = dup2(0xffffffffffffffff, r2) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x1c) timer_create(0x4, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={&(0x7f0000000280)="6bc4faa8dcce4effcbcee2d850eefb149966ec979ee6138bc9d4d6dfa40dcc6476a78a801656f8146f9b564d8922c46cbfcaede93521258d7ccfba1fe5eb7be123c077af1c440e3c9d03241b416dc1c2fefed968ec7e65503ee8330142815fbef391996d115829df394202c1f4d9aae223c8e97a37a9bf03da17dffe408de6c95e7e0eb401aaee251f3cc0bd9866d75d09ccfd228466d4848228ad6105fed879477bdf7516ccaa97ac72d92ff3dfe5b6f50658974022745a121a1d9394027553890988affec1b479fc907e5497d78fe5b4554563af4d143a722bb9b06b064bafcb40c882b1d3", &(0x7f00000008c0)="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"}}, &(0x7f00000001c0)=0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) timer_settime(r5, 0x0, &(0x7f0000000000)={{0x77359400}, {0x77359400}}, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r3) [ 550.053524] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. [ 550.138580] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. 21:04:06 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x7a00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:06 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x5ee4c017) 21:04:06 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x4888, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f00000025c0)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='G\xff3\x00\xa3]m}5\x18\xa52\xdek\xeb{\xc6\x88\xd1\xd3\x9d\xcd*\x04\xd4B\xf1\xb4v\x98\xea\xd7\xe4\x13/T\x97*\xd7\x0f##;&\x12\x99}\xc4\xe9Qw|V\xc0\x8e\x99n\xcc\x7f\xa0K|L*4f\x1a$G\xd4\x13;\xb9\x1e\x01#\xfa\x0f\x00\x04g4\x1exb\xc0y\xf3\x16!\x01\\R\xfe\x1f\x0f\xe2\xab\xc2\xba4=i\xffLb\f\xe2\xb8\xa2\fH\x87y[\x8d?%\xd4\r\xf3B\x1c2\x03\xd9a\x90\x1fN\xe6\xa7U;\xdc!!\x0et\x96\v\xd3\xcc\xa7Y\xd3F\xbe_\xb1\xb9', 0x2, 0x99, &(0x7f0000000000)=""/153}, 0x48) socket$inet6_sctp(0xa, 0x5, 0x84) 21:04:06 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x3}}, 0x10, 0x0}, 0x0) 21:04:06 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x6000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:07 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x8fff243c) 21:04:07 executing program 0: syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x4000, 0x1000, &(0x7f0000001000/0x1000)=nil}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:04:07 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:07 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10, 0x0}, 0x0) 21:04:07 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x6488, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 550.631878] *** Guest State *** [ 550.658302] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 550.674694] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 550.685962] CR3 = 0x0000000000000000 [ 550.691600] RSP = 0x0000000000000000 RIP = 0x0000000000000231 [ 550.699680] RFLAGS=0x00000a96 DR7 = 0x0000000000000400 [ 550.713426] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 550.720653] CS: sel=0x0000, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 [ 550.729554] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 550.738194] SS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 550.746492] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 550.755469] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 550.764095] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 550.772746] GDTR: limit=0x0000ffff, base=0x0000000000000000 [ 550.780865] LDTR: sel=0x0000, attr=0x00082, limit=0x0000ffff, base=0x0000000000000000 [ 550.789408] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 550.798541] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 550.808417] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 550.815650] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 550.824503] Interruptibility = 00000001 ActivityState = 00000000 [ 550.831853] *** Host State *** [ 550.835477] RIP = 0xffffffff811c8ec6 RSP = 0xffff88809814f8c0 [ 550.842034] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 550.849271] FSBase=00007f0cc985f700 GSBase=ffff8880ae900000 TRBase=fffffe0000034000 [ 550.857707] GDTBase=fffffe0000032000 IDTBase=fffffe0000000000 [ 550.863936] CR0=0000000080050033 CR3=0000000052cf4000 CR4=00000000001426e0 [ 550.872420] Sysenter RSP=fffffe0000033200 CS:RIP=0010:ffffffff87001400 [ 550.879656] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 550.886735] *** Control State *** [ 550.890500] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000e2 [ 550.898497] EntryControls=0000d1ff ExitControls=002fefff [ 550.905137] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 550.913360] VMEntry: intr_info=80000202 errcode=00000000 ilen=00000000 [ 550.922437] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 550.930282] reason=80000021 qualification=0000000000000003 [ 550.937486] IDTVectoring: info=00000000 errcode=00000000 [ 550.943022] TSC Offset = 0xfffffed748a16a15 [ 550.947513] EPT pointer = 0x0000000051da101e [ 550.951925] Virtual processor ID = 0x0001 21:04:09 executing program 1: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x8) setxattr$trusted_overlay_nlink(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000200)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000900), 0x2ca, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000240)={{{@in=@broadcast, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000140)=0xe8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000440)=@broute={'broute\x00', 0x20, 0x5, 0x63e, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000940], 0x0, &(0x7f0000000080), &(0x7f0000000940)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{0x3, 0x8, 0x10, 'bcsh0\x00', 'teql0\x00', 'bond_slave_0\x00', 'syzkaller1\x00', @broadcast, [0x0, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0xfe, 0x12e, 0x176, [@limit={'limit\x00', 0x20, {{0x0, 0x100000000, 0x2, 0x841f, 0x0, 0x40}}}, @ip={'ip\x00', 0x20, {{@empty, @local, 0x0, 0xffffffff, 0x0, 0x4, 0x1, 0x0, 0x4e21, 0x4e20, 0x4e24, 0x4e23}}}], [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x6}}}], @common=@ERROR={'ERROR\x00', 0x20, {"f5f277198d8eeb3a09b6c1e665108cbe03a485905282317de4114bd50132"}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x2, [{0x5, 0x18f79e139c94b4ed, 0x8035, 'bond_slave_1\x00', 'gretap0\x00', 'lo\x00', 'vlan0\x00', @local, [0xff, 0xff, 0xa5ed2ce336204003, 0x0, 0xff, 0xff], @dev={[], 0x1b}, [0x0, 0xb10860400d7245b8, 0x0, 0xff, 0xff], 0x9e, 0x136, 0x166, [@m802_3={'802_3\x00', 0x8, {{0x8e, 0x8, 0x0, 0x2}}}], [@common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00', 0xa77, 0x4, 0x7}}}, @common=@log={'log\x00', 0x28, {{0x1, "8664844a3491b9763997900d4f2bca2613875699856322f21d9049de31b6", 0x5}}}], @common=@STANDARD={'\x00', 0x8}}, {0x3, 0x0, 0xad7ca3aca5497a01, 'veth0_to_hsr\x00', 'veth0_to_hsr\x00', 'bridge_slave_1\x00', 'netdevsim0\x00', @broadcast, [0xff, 0x0, 0xbf5898b92ab7be1b, 0xff, 0x0, 0xff], @broadcast, [0xff, 0xff, 0xff, 0x0, 0xd834447b5a77d4a6], 0xe6, 0x116, 0x166, [@m802_3={'802_3\x00', 0x8, {{0x80, 0x7ff, 0x4, 0x2}}}, @limit={'limit\x00', 0x20, {{0x8, 0x46f, 0x9, 0x4f, 0xc9, 0x3}}}], [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}], @common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x4, 0x0, 0x1f}}}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x2, [{0x9, 0x2, 0xfbff, 'syzkaller0\x00', 'bridge0\x00', 'nlmon0\x00', 'ipddp0\x00', @local, [0xff, 0xff], @local, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], 0x6e, 0x9e, 0xce, [], [@common=@redirect={'redirect\x00', 0x8, {{0x7e5aa4ed3c8f3516}}}], @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}, {0x3, 0x42, 0x4, 'ip_vti0\x00', 'bridge_slave_0\x00', 'gre0\x00', 'ipddp0\x00', @remote, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @broadcast, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x6e, 0x6e, 0x9e, [], [], @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x4}}}}]}]}, 0x6b6) quotactl(0x10000, &(0x7f00000000c0)='./bus/file0\x00', r1, &(0x7f0000000340)="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") 21:04:09 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0xd0010100) 21:04:09 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x300}}, 0x10, 0x0}, 0x0) 21:04:09 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x97ffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:09 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x800e, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:09 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in6=@ipv4={[], [], @multicast1}, @in=@broadcast}}, {{@in6=@mcast2}, 0x0, @in6=@initdev}}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getdents(r0, &(0x7f0000000040)=""/46, 0x2e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') syz_genetlink_get_family_id$fou(0x0) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x10) epoll_create1(0x80000) ioctl$sock_x25_SIOCDELRT(r1, 0x890c, &(0x7f0000000280)={@remote={[], 0x2}, 0xa, 'erspan0\x00'}) capget(&(0x7f0000000200), 0x0) 21:04:10 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x8035, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:10 executing program 1: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) r0 = syz_open_procfs(0x0, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x80010, r0, 0x3d) msync(&(0x7f0000951000/0x3000)=nil, 0x3000, 0x0) symlink(&(0x7f00000000c0)='./file1/file0\x00', &(0x7f0000000100)='./file1/file0\x00') mkdirat(0xffffffffffffffff, &(0x7f0000000340)='./file1\x00', 0x0) 21:04:10 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0xd203000000000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:10 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0xeffdffff) 21:04:10 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x3f00}}, 0x10, 0x0}, 0x0) 21:04:10 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x8100, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:10 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8') r2 = syz_open_procfs(0x0, &(0x7f0000000100)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x8, 0x9, 0xffffffff, 0x10000, 0x7}, &(0x7f0000000040)=0x14) setsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000000c0)={r3, 0x400, 0x1000, 0xfffffffffffffff9}, 0x10) sendfile(r1, r2, 0x0, 0x1) [ 553.672362] net_ratelimit: 22 callbacks suppressed [ 553.672369] protocol 88fb is buggy, dev hsr_slave_0 [ 553.672397] protocol 88fb is buggy, dev hsr_slave_1 [ 553.678361] protocol 88fb is buggy, dev hsr_slave_1 21:04:10 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:10 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0xfffffdef) 21:04:10 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000140)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000100)=0x1, 0x4) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f00000000c0)=0x10, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='sit0\x00', 0x10) sendto$inet(r0, &(0x7f0000000240)="19", 0x1, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="436292b5221f924a042a955f69006314a9cb6787810f8b60172a96f3ac4b51d7d5cb13b4761cd9baef4b0d65d03f60d577027cee67f40d7aad6a4791f2cee9e9db9d74cffc3bbb407243360cdba549c3a1113833da5ec0521e2584dab2c2c51c6b618a43ef8d98a1f9439288fdb34d251b937ce8e8a3aa332512d5216007c2d8ac7fda16ea6cbce3e749772d6740b440f1839b028c5c2adc36f0a1afcde859967c8b2d45300c6e61b67a65fd3a1f52705e742faf498b8377dca30225e8a6c3d6d91657b4b5cbc0585a4d960f095c1e78450edaabeec34a81bacae7895774c54b8b62e2a18d93dae8e7", 0xe9, 0x40, &(0x7f0000000000)={0x2, 0x4e22, @remote}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0x7f588810256468cf, 0x420ffe0, 0x0, 0x36) 21:04:10 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x8847, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:10 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x101d0}}, 0x10, 0x0}, 0x0) 21:04:10 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x42000, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000000c0)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x3f}) ioctl$SIOCX25GCAUSEDIAG(r0, 0x89e6, &(0x7f0000000100)={0x10001, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)=@getaddr={0x14, 0x16, 0x10, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x4000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') io_setup(0x7, &(0x7f0000000140)=0x0) io_pgetevents(r2, 0x5, 0x5, &(0x7f0000000180)=[{}, {}, {}, {}, {}], &(0x7f0000000240)={0x0, 0x1c9c380}, &(0x7f00000002c0)={&(0x7f0000000280)={0x9}, 0x8}) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x4542, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x7) read$alg(r1, 0x0, 0x198) 21:04:10 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0xffffff7f) 21:04:10 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x8848, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:10 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0xfcfdffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:10 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x40000}}, 0x10, 0x0}, 0x0) 21:04:10 executing program 1: shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x4000) shmdt(0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x60000, 0x0) ioctl$TIOCGSERIAL(r0, 0x541e, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)}) 21:04:10 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x4000000000000) 21:04:10 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x8864, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CAPI_GET_SERIAL(r1, 0xc0044308, &(0x7f0000000000)=0xffffffffffff7fff) r2 = socket$alg(0x26, 0x5, 0x0) getsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f00000000c0)=0x1, &(0x7f0000000100)=0x4) munmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000) bind$alg(r2, &(0x7f0000000580)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f0000008a00)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000680)=""/120, 0x78}], 0x1}}], 0x1, 0x0, 0x0) 21:04:10 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0xfdfdffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:10 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00\xe8\xee\xc9\x96\xc2;\xaf\t5,\xffx\xf0\xde\xc4\xa8M*\xe4;~y\xb6&\xa5\xaa\xcec\x1e\x8a;\xea;P\xb5w_6\f\xe5\xcc`\xa0\xce\xf0+\x19v\xb9I\xdf\xfe\x13\xd9\x1a\xd6;+\x16\x05\x1aul>\x82@\x0f\xdf\xcd\x99\x9a\x13\xe2[F\xf08\xa6D\x97\xb5\x1f\xf3\xe9\xd5\xbf\x13k\xbc)\xa1nbx\x9c\x02\xa6p?\x12\x89\nAr\xe9Q\xb0\x80Q\x8e\xf2\xf0yX\x9b\x96\xa4\x8b\x01f\xe0\x04\xbd\x93K!\xa0D-\xfc\x12\x02\xe2\xb5WQ\xb4\xb1\xf2\x16)\xc8\b\xc2\x99\x9a\xd9\xa6p\xedK\xb5\x8b\xe8\xbf\xa0\xa1\x13\xd78Mt$\x06\xb6c\xd0Y\x05\xd1l\x98|\xff\xb5\v\x930x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x1000000}}, 0x10, 0x0}, 0x0) 21:04:11 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x100000000000000) 21:04:11 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x8906, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 554.385777] __ntfs_error: 32 callbacks suppressed [ 554.385789] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. 21:04:11 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x3000000}}, 0x10, 0x0}, 0x0) 21:04:11 executing program 1: write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000f00)={0x43, 0x9, 0x0, {0x0, 0x3}}, 0x43) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000000dc", 0xff0f}], 0x3, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x80, 0x0) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000100), &(0x7f0000000140)=0x4) [ 554.471984] ntfs: (device loop5): read_ntfs_boot_sector(): Could not find a valid backup boot sector. 21:04:11 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0xe803, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:11 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x900000000000000) [ 554.555464] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. 21:04:11 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100008}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0xb0, r2, 0x418, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0xcd5e}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x81}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x81}, @IPVS_CMD_ATTR_SERVICE={0x4}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}]}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lo\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x81}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@loopback}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x855379f5e46d2c75}, 0x8000) [ 554.632351] protocol 88fb is buggy, dev hsr_slave_0 [ 554.638095] protocol 88fb is buggy, dev hsr_slave_1 21:04:11 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0xf000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 554.675664] BFS-fs: bfs_fill_super(): Inode 0x00000030 corrupted [ 554.689019] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 554.703056] ntfs: (device loop5): read_ntfs_boot_sector(): Could not find a valid backup boot sector. 21:04:11 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x1542da66}}, 0x10, 0x0}, 0x0) [ 554.723930] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. 21:04:11 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0xfdffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:11 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x51, 0x2}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}) write$evdev(r0, &(0x7f0000000040)=[{}, {}], 0x52a) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x4800, 0x0) ioctl$TIOCCBRK(r1, 0x5428) 21:04:11 executing program 0: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x56ef, 0x0) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x80000) accept$unix(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000240)=0x6e) socket$isdn_base(0x22, 0x3, 0x0) r1 = syz_open_dev$cec(&(0x7f00000002c0)='/dev/cec#\x00', 0x1, 0x2) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000440)=0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x80040, 0x0) sched_setattr(r2, &(0x7f0000000080)={0x30, 0x6, 0x1, 0x9, 0x3ff, 0x811fbed, 0xfbba, 0x9}, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc0585604, &(0x7f00000000c0)) ioctl$KVM_GET_PIT(r1, 0xc048ae65, &(0x7f0000000300)) 21:04:11 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0xc00000000000000) [ 554.792349] protocol 88fb is buggy, dev hsr_slave_0 [ 554.792366] protocol 88fb is buggy, dev hsr_slave_0 [ 554.798146] protocol 88fb is buggy, dev hsr_slave_1 [ 554.803476] protocol 88fb is buggy, dev hsr_slave_1 [ 554.814065] protocol 88fb is buggy, dev hsr_slave_0 21:04:11 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x3f000000}}, 0x10, 0x0}, 0x0) 21:04:11 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x1414ac, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 554.934626] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 554.997380] ntfs: (device loop5): read_ntfs_boot_sector(): Could not find a valid backup boot sector. 21:04:11 executing program 0: ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r1, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) ioctl$VT_DISALLOCATE(r1, 0x5608) ioctl$TCSETSF(r2, 0x8924, &(0x7f0000000000)) ioctl$KDENABIO(r3, 0x4b36) 21:04:11 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x5ee4c01700000000) [ 555.038989] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. 21:04:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='configfs\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getdents(r1, &(0x7f0000000500)=""/205, 0x1e) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7ff, 0x40000) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x3ff) getdents(r1, &(0x7f0000000240)=""/165, 0xa5) 21:04:11 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x8fff243c00000000) 21:04:11 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0xf0ffff, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 555.133622] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 555.138763] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. 21:04:11 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x66da4215}}, 0x10, 0x0}, 0x0) 21:04:11 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0xfeffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:11 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x1000000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:12 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, 0x0}}, 0x20) connect$rds(r0, &(0x7f0000000000)={0x2, 0x4e21, @remote}, 0x10) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000040)=[@in6={0xa, 0x4e22, 0x8000000000000, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3}, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}], 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x5100, 0x0) 21:04:12 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0xd001010000000000) 21:04:12 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x2000000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:12 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0xc45c80eb}}, 0x10, 0x0}, 0x0) [ 555.526077] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. 21:04:12 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x33d, 0x0) setsockopt$rose(0xffffffffffffffff, 0x104, 0x7, &(0x7f0000000000), 0x4) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f0000001480)=""/4096) 21:04:12 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0xffff1f0000000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:12 executing program 1: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-control\x00', 0x88002, 0x0) ioctl$TCSETXW(r2, 0x5435, &(0x7f0000000500)={0x4, 0xc1, [0x101, 0x5f7a, 0x1, 0x8, 0x7], 0xec0f}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000400)='/dev/mixer\x00', 0x1, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f0000000440)={0x10000, 0x100000}) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r1, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0x88, r4, 0xfad5ddb201a95e90, 0x70bd25, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x400, 0x4, 0x62]}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr="7fd384570be95c0bab603425aeaed613"}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x8563, 0x200, 0x5, 0x9]}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffffffffffffffc}, @SEG6_ATTR_SECRET={0x10, 0x4, [0x2, 0x1, 0xffffffffffffffff]}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x80000000}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x6}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x2}]}, 0x88}, 0x1, 0x0, 0x0, 0x10}, 0x804) setsockopt$inet6_dccp_buf(r2, 0x21, 0xd, &(0x7f00000004c0)="ed2f2435a79f5a01412811f4bb8930cb6471edfb5b123ae420f4d0267e42f9ffb2cbf53fca992fac0e223798b3be837e5248", 0x32) r5 = syz_open_dev$usb(&(0x7f00000002c0)='/dev/bus/usb/00#/00#\x00', 0x5, 0xa0400) ioctl$sock_x25_SIOCDELRT(r5, 0x890c, &(0x7f0000000300)={@null=' \x00', 0x8, 'nr0\x00'}) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000180)={0x0, 0x7, 0x0, [], &(0x7f0000000140)={0x0, 0x0, [], @p_u8=0x0}}) 21:04:12 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x3000000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:12 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0xeffdffff00000000) 21:04:12 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0xd0010100}}, 0x10, 0x0}, 0x0) 21:04:12 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000300)=ANY=[@ANYBLOB="1f0000000000000000000040050000a90000e7fc4b83bbb6a23b4b6942b7871001000000000000002560b700fff0ffff0403ffffffff00000a00000006"]) r3 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x5, 0x400) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x788}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000140)={r4, 0x3}, &(0x7f0000000180)=0x8) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"]) 21:04:12 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x4000000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:12 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0xffffff7f00000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:12 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0xffffff7f00000000) 21:04:12 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0xeb805cc4}}, 0x10, 0x0}, 0x0) 21:04:12 executing program 0: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4800) read$alg(r0, &(0x7f0000000040)=""/88, 0x58) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x1, 0x0) 21:04:12 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x6000000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:12 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x7000000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:12 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') msgget$private(0x0, 0x400) msgget$private(0x0, 0x0) msgget$private(0x0, 0x2) r1 = msgget(0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xc90108}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r2, 0x200, 0x70bd27, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000804}, 0x8000) r3 = msgget(0x2, 0x4) msgctl$IPC_STAT(r3, 0x2, 0x0) r4 = fcntl$getown(r0, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f00000001c0)=0x6) unshare(0x20000) syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x9, 0x4000) r5 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, &(0x7f0000000200), &(0x7f0000000240)=0x18) setns(r5, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000280)=@assoc_value, 0x8) close(r0) msgctl$IPC_RMID(r1, 0x0) 21:04:12 executing program 1: r0 = socket$caif_seqpacket(0x25, 0x5, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x400000, 0x80) sendto(r0, 0x0, 0x0, 0x9b041aeb802de541, 0x0, 0x297) 21:04:12 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0xffffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:12 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0xffffffff00000000) 21:04:12 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0xffffff7f}}, 0x10, 0x0}, 0x0) 21:04:12 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x8000000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:13 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video0\x00', 0x2, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000000)={@un, {0x0}, 0x0}, 0xa0) 21:04:13 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:13 executing program 3: close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r2, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:13 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4000000000000}}, 0x10, 0x0}, 0x0) 21:04:13 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x8060000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:13 executing program 0: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, r1, 0x400, 0x70bd2a, 0x25dfdbfe, {{}, 0x0, 0x4108, 0x0, {0x1c, 0x18, {0x401, @bearer=@l2={'ib', 0x3a, 'veth0_to_bond\x00'}}}}, ["", "", "", "", "", ""]}, 0x38}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f0000000180)) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x3, &(0x7f00000001c0)=[{0x7, 0xc4, 0xff, 0x2}, {0x4, 0x7f, 0x6, 0x5}, {0x2, 0x1f, 0x1, 0x81}]}, 0x10) connect$vsock_stream(r0, &(0x7f0000000240)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f0000000280)=""/4096) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000001280)={0x0}, &(0x7f00000012c0)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000001300)={r2, @in6={{0xa, 0x4e24, 0x7, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1b6000}}, 0x0, 0x7}, &(0x7f00000013c0)=0x90) ioctl$RTC_PIE_ON(r0, 0x7005) connect$vsock_stream(r0, &(0x7f0000001400)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$UI_DEV_DESTROY(r0, 0x5502) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000001440)={"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"}) ioctl$TIOCNOTTY(r0, 0x5422) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000001840), &(0x7f0000001880)=0x4) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f00000018c0)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000001940)={r3, 0x1c, &(0x7f0000001900)=[@in6={0xa, 0x4e24, 0xc15b, @dev={0xfe, 0x80, [], 0x12e6}, 0x80000000}]}, &(0x7f0000001980)=0x10) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f00000019c0)={0x1}) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001a40)=@raw={'raw\x00', 0x9, 0x3, 0x318, 0x0, 0x130, 0x130, 0x130, 0x0, 0x248, 0x248, 0x248, 0x248, 0x248, 0x3, &(0x7f0000001a00), {[{{@uncond, 0x0, 0xc8, 0x130}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x1, 0x1, 0x40, 0x1, 'snmp\x00', 'syz1\x00', 0x2}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0x2}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) getsockname$llc(r0, &(0x7f0000001dc0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000001e00)=0x10) ioctl$SG_GET_RESERVED_SIZE(r0, 0x2272, &(0x7f0000001e40)) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000001e80)={r2, 0x2, 0x7}, &(0x7f0000001ec0)=0x8) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000001f00), &(0x7f0000001f40)=0x4) socket$unix(0x1, 0x1, 0x0) delete_module(&(0x7f0000001f80)='/dev/swradio#\x00', 0x800) syslog(0x0, &(0x7f0000001fc0)=""/9, 0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000002000)={0x0}, &(0x7f0000002040)=0xc) rt_sigqueueinfo(r4, 0x4, &(0x7f0000002080)={0x27, 0xfffffffffffffffa, 0x2}) ioctl$TIOCMIWAIT(r0, 0x545c, 0x0) ioctl$KVM_S390_UCAS_MAP(r0, 0x4018ae50, &(0x7f0000002100)={0x10000, 0x2, 0x45a}) 21:04:13 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:13 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000000)=""/35, 0x23) r2 = dup3(r1, r0, 0x80000) recvfrom$rose(r2, &(0x7f0000000100)=""/128, 0x80, 0x40000021, &(0x7f0000000040)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0x1c) getdents64(r1, &(0x7f0000000200)=""/109, 0x6d) 21:04:13 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x100000000000000}}, 0x10, 0x0}, 0x0) 21:04:13 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0xb000000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:13 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x3, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:13 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000080)={0x0, 0x7931}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000001c0)={r3, @in={{0x2, 0x4e21, @loopback}}, [0x9, 0x7, 0x20000000000000, 0x5, 0xfffffffffffffff9, 0x287, 0x6, 0x7, 0x8, 0x78cf, 0x400, 0x5, 0x400000000000, 0x9]}, &(0x7f0000000100)=0x100) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r5, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:13 executing program 0: r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x4, 0x404081) fcntl$getownex(r0, 0x10, &(0x7f0000000080)) socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x0, 0x8001}, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x40000, 0x124) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r2, &(0x7f0000005fc0), 0x800000000000059, 0x0) 21:04:13 executing program 1: r0 = socket(0x10, 0x3, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x0, 0x30}, &(0x7f0000000080)=0xc) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000100), &(0x7f0000000140)=0x14) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000000c0)={0x7, 0x8, 0x200, 0x4, 0x4, 0x4, 0x4ea, 0xfffffffffffffff9, r1}, 0x20) write(r0, &(0x7f0000000000)="240000002a001f02ff07f4f9002304000a04f51108000100030100020800038005000000", 0x24) 21:04:13 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x300000000000000}}, 0x10, 0x0}, 0x0) 21:04:13 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0xd000000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:13 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x4, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:13 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x5, 0x803, 0x0) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0x1c4) 21:04:13 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x5, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:13 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x3f00000000000000}}, 0x10, 0x0}, 0x0) 21:04:13 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x10000000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:13 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='rootfs\x00', 0x0, 0x0) tee(r0, r0, 0x3f, 0xa) ioctl$TIOCNXCL(r0, 0x540d) 21:04:13 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt(r0, 0x3ff, 0x5, &(0x7f00000001c0)="04d59a8e3dbe89136c5f6dc7def1f97c55016424be73e99d2f47226c83f5821825e9bcbe1218ce41bc317a3c05c0623f54ec86fd7b9fdb4509551cc982aadd4cfb5c6a91b064dfa529a81ac43032ff67c929c2abc0493251811a73349fbbe3d4bc0f84e8baaceb79591c43480c070fd7dd82d8cbde9076458d8c2b7a53206c48eb484e1c6a8ca1dbc4a474fcc2732dfecc0821596afce2f46a7d8c737b1189d2c5959351a5d4a8d933adb2cbd11d84f169bf4d622d76b45199e5fe9cee5edc2a9af9eb75a65e1fe65e5168", 0xcb) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180)=r3, 0xffffff5b) sendmsg$tipc(r5, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:13 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x6, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:13 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x66da421500000000}}, 0x10, 0x0}, 0x0) 21:04:13 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x14000000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:13 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x7080, 0x0) mount(&(0x7f0000000180)=@sg0='/dev/sg0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x100015000, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/load\x00', 0x2, 0x0) umount2(&(0x7f0000000540)='./file0/file0\x00', 0x0) 21:04:13 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu\x00E\xab\xcbw\x83.\xf3\x8a\xf6\xb3\xac\xfe\x9ek9\xcd\"\x84\x18/~[{\xfb\xc2\t}\xaaCSM^Z\x98\x0eZ\xfca5b\xd6\x92\a\xd6*\xd8v\xd0\xb1\x00=k|\xf1P\xbf\x17\x1b\x8f\xd6LT`V\\\xaeuJ[:\xcd<\xa1L\xec\x9fU\xe9\x14_g=\xfc\x7f\xbd-\xb2\xfa\xee\xe3\a~\x90\xd4\x90\a\x83\x81\xac\x1bWE_\x05;\xefk\x1e\xed:\x90\xc1\xba\x96\xde\xfac\xf0\'&:dn`\xe8\xa6-\x1dh\xb07#T\xa6\xa3\x9c\x91\xf3\b\xa3m;\xd0\xe2z\x81G\xb9\xa9\x8b\xf3\x8f\xa2\xee', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpuset.cpu_exclusive\x00', 0x2, 0x0) dup3(r0, r1, 0x0) 21:04:14 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x7, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:14 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x1, 0x2) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)=0x7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) signalfd(0xffffffffffffffff, &(0x7f0000000080), 0x8) gettid() socket$kcm(0x29, 0x7, 0x0) 21:04:14 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000080), 0xfe47, 0x0, 0x2bd}, 0x0) 21:04:14 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x18000000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:14 executing program 1: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socket$isdn_base(0x22, 0x3, 0x0) tkill(r0, 0x12) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/status\x00', 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x10040, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@mcast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) recvfrom$packet(r1, &(0x7f0000000040)=""/199, 0xc7, 0x2100, &(0x7f0000000340)={0x11, 0x10, r2, 0x1, 0xb06, 0x6, @remote}, 0x14) 21:04:14 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sync_file_range(r0, 0x2, 0x81, 0x7) r1 = openat$vimc1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_DV_TIMINGS_CAP(r1, 0xc0905664, &(0x7f0000000100)={0x0, 0x0, [], @raw_data=[0xfff, 0x101, 0x8001, 0x10001, 0x3, 0x0, 0x8001, 0x4, 0x68, 0x9, 0x4, 0x7, 0x6b, 0x4, 0x81, 0x20, 0x3124, 0x9, 0x609, 0x73604174, 0x7, 0xffff, 0x2, 0x80000001, 0x6, 0xffffffffffffffea, 0x1, 0x0, 0x8000, 0x22, 0x8, 0x1f]}) r2 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_QUERYBUF(r2, 0xc0585609, &(0x7f0000000040)={0x0, 0x8, 0x4, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "beb4e66d"}, 0x0, 0x0, @userptr, 0x4}) getrlimit(0xa, &(0x7f00000001c0)) readahead(r1, 0x1, 0x7ff) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000240)=0x6f5, 0x4) 21:04:14 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x8, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:14 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x20000000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:14 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0xc45c80eb00000000}}, 0x10, 0x0}, 0x0) 21:04:14 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8003, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r3, &(0x7f00000000c0)="1dd9b871ce7e25ce7440ceb2b77e48ca8e194e77845c8a30b2b1183714463f25609c39f3284cb8233af719837b90b91ba71a9bf54b", &(0x7f00000001c0)=""/236}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r5, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:14 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0xd001010000000000}}, 0x10, 0x0}, 0x0) 21:04:14 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x9, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) getpid() 21:04:14 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x26000000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:14 executing program 3: socketpair(0x1e, 0x1, 0x8001, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(r2, &(0x7f00000009c0)=[{{&(0x7f0000000ac0)=@ethernet={0x0, @local}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000240)=""/80, 0x50}], 0x1, &(0x7f00000002c0)=""/3, 0x3}, 0x101}, {{&(0x7f0000000380)=@x25, 0xffffffffffffff94, &(0x7f0000000640)=[{&(0x7f0000000400)=""/197, 0xc5}, {&(0x7f0000000300)=""/22, 0x16}, {&(0x7f0000000500)=""/102, 0x66}, {&(0x7f0000000580)=""/163, 0xa3}], 0x4, &(0x7f0000000680)=""/182, 0xb6}, 0x9}, {{&(0x7f0000000740)=@tipc, 0x80, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/36, 0x24}, {&(0x7f0000000800)=""/171, 0xab}], 0x2, &(0x7f0000000900)=""/178, 0xb2}, 0x40}], 0x3, 0x40, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) r4 = getpid() ptrace$peekuser(0x3, r4, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r5) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r6, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) r7 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r7, 0xc018620b, &(0x7f00000000c0)={0x8002}) 21:04:14 executing program 0: prctl$PR_TASK_PERF_EVENTS_DISABLE(0xe) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x10000) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f00000000c0)={0x4, 0x53, &(0x7f0000000040)="ed3c279142afa410be2bda2f13ec5ff1272ed31d1bbf31756750d038f8bd2a1b36b6df8d99a9768a09f0b9f410552de5df4ebd0ee6330d764830d035d24d9fb753f884be87a1771866d9b834faf34fcb9595ef"}) 21:04:15 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x100, 0x0) symlinkat(&(0x7f0000000040)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00') sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000000)=@newspdinfo={0x1c, 0x24, 0x1, 0x0, 0x0, 0x0, [@ipv6_hthresh={0x8, 0x4, {0xf0}}]}, 0x1c}}, 0x0) 21:04:15 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0xa, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:15 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0xffffff7f00000000}}, 0x10, 0x0}, 0x0) 21:04:15 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) r5 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x8, 0x0) ioctl$UI_SET_MSCBIT(r5, 0x40045568, 0x37) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:15 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x28000000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:15 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x5516c1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x5) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd000000100001000a0c1000000000000004fcff", 0x58}], 0x1) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xc02, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000000)={0x0, 0x80000, r2}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000280)=0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x9, 0x0, 0x10000, 0x7, 0x0, 0xffffffffffff8001, 0x1020, 0x0, 0x1c0, 0x8, 0xe, 0x7, 0x5, 0x800, 0x7, 0x8, 0x6, 0x1f, 0x81, 0x2, 0x3, 0x6, 0x6227, 0xfffffffffffff801, 0x2, 0x9, 0xf193, 0x100, 0x4, 0x59e, 0x4f7, 0x9, 0x3, 0x440, 0x9, 0x7ff, 0x0, 0x3, 0x1, @perf_config_ext={0x7}, 0x10000, 0x100000000, 0x4, 0x8, 0x8, 0xe614, 0xece}, r4, 0x7, r0, 0x2) sched_getparam(r4, &(0x7f00000002c0)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/checkreqprot\x00', 0x14b000, 0x0) ioctl$DRM_IOCTL_GEM_CLOSE(r0, 0x40086409, &(0x7f0000000040)={r3}) 21:04:15 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0xe, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:15 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x40000000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:15 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:15 executing program 0: r0 = socket(0x200000000000011, 0x4, 0x2) accept$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'ip6_vti0\x00', r1}) syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x101) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) signalfd(r0, &(0x7f0000000080)={0x3a9}, 0xffffffffffffffb3) 21:04:15 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x100000000000012) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x222000, 0x0) accept4$alg(r1, 0x0, 0x0, 0x80000) kexec_load(0x100000001, 0x8, &(0x7f0000000680)=[{&(0x7f0000000100)="ef4e063be6444df8f187577bd771fd0772f96e064734ed95e5b41f90ae83705e7aea92c5c79e9eba1b0fec59794c22f15dd0df782a680354ef4510098bb14a95e761abc7308ce909b389e79bb64d9f9a83bb0ff29afc6f2934eff4742c4d12de812a15dd85c8935979350d2a65bd20c7ed54a6a1ccc5ac11bb9e96238fb21877f685dbf76e745ab5155ba5a6401a8bf8435a06894f42ec65ecada9c9e90c42359051aab4c1f8edbe0cf2c8d1f434188f77ef706555f1fe870a285cc9a59c0a93011610156a85bc34de5d1cb435", 0xcd, 0x5, 0x8001}, {&(0x7f0000000200)="19b8973ab1f824a6763df31bec7032390bb26544fe25551c7db0aba0f1c484bc475061391a091d417a809c8c7ca107f29fa1894c578ff9f93b17ba4f63900ec4d3049db9f620ec058d79137f703956a748342328f3920543f1ef1991aa6fedcfb4bc1746b7c29b6d19fb286105c19c91f6dfc59915df77d2010579b20525f43691c931635dd063edb903ef815b745426f32c4227f7f4c6be1ce874a660aa83381986606a8e25dcfdf63b5248543887659a3490863d5c32796e0a28d6c80ab53a65c45ddfe21d3670ac17a7c8f3871fcc56d9b7a4cfb15d624d3f", 0xda, 0x5, 0x3f}, {&(0x7f0000000300)="188f519fcbcbfdce47fff0c679c19867df0f76fe6b900267f15519b6ca82b14f31528dbeff1678bcc7067399baf13660b9626f8f7ab9fde098861f47f8a291be6f6f7030b3d92c48f7df4f94439f48377b1f8239564ed1401c57462fd146f1f6b774dffe89", 0x65, 0x324, 0x6}, {&(0x7f0000000380)="380c67f4196b721b120e3d4daef6c23517be19f5899d3baf5978b6460e031e5940f1e17200d922fc18b867052e7d0de74ac7abf6ac4bb2693b2e6acfcad2f30037dc16412974b7a2afb38672df5884e48713617cb96f9292d2825cebf5bc7620a3559c447d986e26e5da1b24bdde409e9711df7b949dd61c12fc7a65d945624614", 0x81, 0x1, 0x67}, {&(0x7f0000000440)="40d3081b58c34be074bf2848a9687e0cb95b164cdc869c646a8fa3dff0b71d42d77deb5921a65d0c97953441c2c50b55bba1cfab6503266591f080dbef81880a6e23687c39c5efa86a7a5360871a802ed4c5612e3ae455a5c184eb9ed6a15f47908a07f68b2d2e5dd18db310123c137bb9eb60", 0x73, 0xc6ed, 0x20}, {&(0x7f00000004c0)="7c9a2e241ed8601134936a2ca66ed508829db2d0ed9de97382d3878984bae5bd93e965a07b", 0x25, 0x4, 0x3}, {&(0x7f0000000500)="57baba804f4f23314f57d5584b0780a7166de871a8dbcaa3458bb6d0489e7531834f4c6e2caad88a45f8580fb79f82a91739d5747734bffab992f7bfe4ba519c37d4b22666077f6fcddd52924851c76f8a464f6b4183aa1ebe4910f85cb57969c5dcfc6466d42ab66e866574470ba46b8464eb3698fa15e03b23308b4dff54b364d6e0c3d1f475165ff836b76c626ac33284cf7d3f4994508d4de4d54af522b2920c0f4913925dcd8aed321080", 0xad, 0x3, 0x8}, {&(0x7f00000005c0)="363e806fbe8ff598f8f21f8477885835c1616d650877eb7713c933318afa3039513b6c3d8cb1fe56235d33b44366d003a3f202da9cd621af35cb95912082e088bcba4ea70bbd11348ed406bce7aa7c8e623e1873489351a7fd5562988eb932b165f53d65d98413e79c2fd95b8cbbea08f1f48278065f5c8f270cec881d85238fd054fb7768f791641c1713f77090ed2600e71005a72e81fd92e41f6490a235ea3f97b04693802edeb0b3ba06", 0xac, 0x401, 0x76}], 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000080)={0x1, 0x9, 0x3, 0x80000001}) 21:04:15 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0xf, 0x0}, 0x0) 21:04:15 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x10, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:15 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x43050000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:15 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x1, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r5, 0x40086200, &(0x7f00000000c0)=0x3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:15 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000003c0)='/dev/dsp#\x00', 0x6, 0x800) sendmsg$nl_route(r0, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000800}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=@getneightbl={0x14, 0x42, 0x100, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x4080) getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) getitimer(0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) prctl$PR_GET_FP_MODE(0x2e) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) sched_yield() perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$netlink(0x10, 0x3, 0x8000000004) sendmsg$nl_crypto(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=@upd={0xe0, 0x12, 0x1, 0x0, 0x0, {{'ctr-aes-neon\x00'}}}, 0xe0}}, 0x0) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f00000002c0)={r1}) [ 558.792330] net_ratelimit: 14 callbacks suppressed [ 558.792338] protocol 88fb is buggy, dev hsr_slave_0 [ 558.802454] protocol 88fb is buggy, dev hsr_slave_1 21:04:15 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36df, 0x40010, 0x1, 0x0, 0x0, 0x800000, 0x3, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x80, 0x0, 0x7, 0x100, 0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x3f, 0x11, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x400000010000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{0x0, 0x0, 0xffff}]) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000040)={0x30}, 0x4) 21:04:15 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x22, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:15 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x20000050, 0x0}, 0x0) 21:04:15 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x4) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1f, 0xb9d839a71745b356, 0x1, &(0x7f0000000100)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000240)={0x0, 0x3}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f00000002c0)={r5, 0x0, 0x2, 0x8001, 0x4, 0x7}, 0x14) sendmsg$tipc(r3, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:15 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x60000000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 558.953119] protocol 88fb is buggy, dev hsr_slave_0 [ 558.958667] protocol 88fb is buggy, dev hsr_slave_1 [ 558.962366] protocol 88fb is buggy, dev hsr_slave_0 [ 558.968861] protocol 88fb is buggy, dev hsr_slave_1 [ 558.974040] protocol 88fb is buggy, dev hsr_slave_0 [ 558.979466] protocol 88fb is buggy, dev hsr_slave_1 21:04:15 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2c, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="18020000000000000000000000000000850000001500000095008e06ec820000f72b0bfa8f10076ced94a9766b9e619142fd51514387ffa1db44e7595445fd22196597941e51f39497eff33cb799911851583d4f0d5b6394989aae801d0618dc6caef447139b65795927e5fe7d5e746a46a21b3ddc2bfea5c3c010"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:04:15 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:15 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x800e0000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:15 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x48, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:15 executing program 3: socketpair(0x2, 0x2, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r5, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) ioctl$VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f00000000c0)={0x9c, 0x3f353f4b2b143393, 0x4, 0x400, {0x77359400}, {0x3, 0x8, 0x800, 0x3, 0xffffffff, 0x80000000, "7d36cfd5"}, 0x4, 0x2, @planes=&(0x7f0000000080)={0x80000001, 0x80000000000, @userptr=0x3, 0x8001}, 0x4}) 21:04:16 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000540)=""/11, 0xa99) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x20002104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_ifreq(r1, 0x0, 0x0) 21:04:16 executing program 1: 21:04:16 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x4c, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:16 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x80350000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:16 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:16 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f0000000080)={@remote, 0x0}, &(0x7f00000000c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000100)={'team0\x00', r3}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r5, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:16 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x81000000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:16 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x60, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:16 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0xd0, &(0x7f0000000200)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}}, @icmp=@parameter_prob={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @empty=0x1000000}}}}}}, 0x0) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) getpeername$inet(r0, 0x0, &(0x7f0000000080)) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e0080e) 21:04:16 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x68, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:16 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:16 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x100, 0x0) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r3, r4, 0x2, 0x1}, 0x10) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r5) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r6, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) ioctl$TIOCMBIC(r4, 0x5417, &(0x7f00000001c0)) 21:04:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) write$cgroup_int(r1, &(0x7f00000000c0)=0x3, 0x12) recvmsg$kcm(r0, &(0x7f000000de40)={&(0x7f000000dbc0)=@can, 0x80, &(0x7f000000dd40)=[{&(0x7f000000dc40)=""/220, 0xdc}], 0x1, &(0x7f000000dd80)=""/190, 0xbe}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x8000) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002b008163e45ae08700000000120f0000000000bc4cc91b4dd65b2f0580cb7023072a556d1c958c000000", 0x2e}], 0x1}, 0x0) socket$kcm(0xa, 0x0, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x11, 0x0, 0x0) 21:04:16 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x86ddffff, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:16 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x6c, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:16 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:16 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x74, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:16 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) sendmsg$inet_sctp(r0, &(0x7f0000000780)={&(0x7f00000000c0)=@in={0x2, 0x4e22, @rand_addr=0x240000}, 0x10, &(0x7f0000000680)=[{&(0x7f00000001c0)="6babbd82bcbe14ea0d5bb6ea086ae2accd1fccee1928badf0cfe6e92c336b25fb5975db3e08fc7ec82549b8b4669b56384ebb8d3382df1c142898aa85883000dadb015361dcad538c02e87e2dd2ed11d01bb677feb58d7fecb2943008385996387f34a32bdfe7c79d6df44f0fd697e67be08dadad85b42b304d0eb96255f8cb031fb0903c73a0ba812fa731cd6c70e35fea0f83206dacb2744112f0c9cf20ab08226450f77ebc38ab7e005", 0xab}, {&(0x7f0000000280)="37d077e3c1067d12f1cc14d236140b3c0c69777d2b3a13064929c05e7e90b5cd941e8e57da41d51e84cafe6dc3e6e7ca717a23041361883ecf6554f83091a06c4294a3d831b7c4f54f3a4761d920db8adac6389e0893e48dd527da79a20fff5fd7d7d0407bd46d6c45619e31f2438e0d52a84bf2403bc9bbdaa73ae001791c08d283471a5f7196bacf2b245cf7db3801b29eee6b3d03579d5abaec89db3e85efa3af79d94f9ea4285b7496b4e5d3", 0xae}, {&(0x7f0000000380)="c1e4d3803f7be64623fbbaa679d059b4934852e60f3bd0c7133307d3815bbe13fbca0ea6e890bfaf4cfcb5abd610468c2640b10a639e78e499b4208ddd1c7726dcdd5d5d23578f75dd66a9f7bccaf5687c032af74869765f6149", 0x5a}, {&(0x7f0000000400)="aef46b1821f75ff9f19a7f1ee278168d67c828eb422d4cdff1a72435ad6d4e03775c086c37938105fd64287b682597bbafb4491ef58a1490abc888dce0af67dc38deb731a78992b0963c6c5eb37cc47e6f22437e60ec757217dae0e4413f930413ccf0f777a50dafadea6ecaacbf29811d161dc129db0804f5fb6e7412e953a4e201ec5660a20a17947084cfddefe4", 0x8f}, {&(0x7f00000004c0)="428f1716cd9ce778be3cf5556dee4a229a0e5a375b0b5cb91368d04d9eed3db3b527e0b0c29a6836c65321694d6aaf83b8692ba505c79f02bc4a67ce9219ea112197e782e2df168280f1d6865e035910533ad756e7272e74b1a5c83b026a0cee95279845dc487c2f8d4006a9aa7b426359f0704d5cb546e5ef36408dac64f82d5c2921fcd23754334d84efce0e3bedf4", 0x90}, {&(0x7f0000000580)="4b31141afc4f362f218a25cb8591070c2fc687e0c98b6c8d973234aeb964cb443a998c7b6f5340bce5cd3e8a70ae2f15688f10c288088030e990cfbb7b8bbafc8b2788786103a043c0cf48d1a8ea7e4e51e7e3ce32b56d386fa5104c8e9040c63d3c9043c460c26c437bf41024968f2f925ace0de3abcc31b60fc0ddc3577a2e20aab12abd9f99b698646d4e22f96b4ed60bc878a21ab29ac3902cfa905b011a21ec8c5542dd003323e26973820700848b169c816f2ee1a65ea9cb1b9caf0f0324863a7c703c6d7ab1c4e3f2fcbfcd1326f48b5089e84759ad0fd37467af79fb1885582fc25388", 0xe7}, {&(0x7f0000000100)="7bd5f6f6a142565d98850ef9233d140f07230b282738c7e563f60380493a9aa41f827a", 0x23}], 0x7, &(0x7f0000000700)=[@authinfo={0x18, 0x84, 0x6, {0x7}}, @dstaddrv4={0x18, 0x84, 0x7, @multicast1}, @authinfo={0x18, 0x84, 0x6, {0x3f}}], 0x48, 0x10}, 0x8000) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180)=r5, 0x4) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:16 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x88470000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:16 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) [ 559.912332] protocol 88fb is buggy, dev hsr_slave_0 [ 559.912337] protocol 88fb is buggy, dev hsr_slave_0 21:04:17 executing program 1: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000100)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000080)=[{&(0x7f0000001480)="7386867b5e57ba84fcbd28721033", 0xe}], 0x1}, 0x0) 21:04:17 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x7a, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:17 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x4) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r3, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:17 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="180200000000000000000000000000010c0000001c00000095008e06ec820000f72b0bfa8f10076ced94a9766b9e619142fd51514387ffa1db44e7595445fd22196597941e51f39497eff33cb799911851583d4f0d5b6394989aae801d0618dc6caef447139b65795927e5fe7d5e746a46a21b3ddc2bfea5c3c010"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:04:17 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x88480000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:17 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:17 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x300, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:17 executing program 0: 21:04:17 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x88640000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:17 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:17 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:17 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x88a8ffff, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:17 executing program 0: 21:04:17 executing program 1: 21:04:17 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x3d2, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:17 executing program 3: socketpair(0xcfa32e7f488a913, 0x1, 0x9, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x4001ff) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:17 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x500, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:17 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x88caffff, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:17 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:17 executing program 0: 21:04:17 executing program 1: 21:04:17 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x89060000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:17 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x600, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:17 executing program 0: 21:04:17 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) r5 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x74, 0x800) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x200200, 0x0) ioctl$TUNSETFILTEREBPF(r5, 0x800454e1, &(0x7f0000000100)=r6) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:17 executing program 1: 21:04:17 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0xac141400, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:17 executing program 0: 21:04:17 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:17 executing program 1: 21:04:17 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x700, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:17 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x200a00, 0x0) ioctl$KDSKBLED(r3, 0x4b65, 0x100000001) ioctl$DRM_IOCTL_AGP_RELEASE(r3, 0x6431) socketpair(0x1e, 0x80005, 0xfffffffffffffff6, &(0x7f00000000c0)={0x0, 0x0}) ioctl$KVM_ASSIGN_SET_INTX_MASK(r3, 0x4040aea4, &(0x7f0000000100)={0x10000, 0x8, 0x1, 0x4, 0x1}) ioctl$LOOP_SET_CAPACITY(r3, 0x4c07) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r5, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:17 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0xe8030000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:17 executing program 0: 21:04:18 executing program 1: 21:04:18 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x900, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:18 executing program 0: 21:04:18 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:18 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000080)={0x0, 0xa7, "fbe577f456d0989efd2fd5b4f10ff218dd443ea35e3f59270b943219fbb442b2cf4da496ad9cc00097608306a6b553f1cae8f211112ba8886da98f20aaccf9abb5b4f7c795b8078264ec103e4e19195d85167fd3c6d298b88fcd37e12051d85638add2633bb4c504d90f2a61f2c164674858ad0c5d263f12ab2382f76ba6a8d1057813fa7348d9c5f1fa6ddc3f438e2c0b2390aae6a1a8926e1f24bd68c3f73f53eb6854a63517"}, &(0x7f00000001c0)=0xaf) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r3, 0x84, 0x78, &(0x7f0000000200)=r5, 0x4) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:18 executing program 1: 21:04:18 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0xfdffffff, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:18 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0xa00, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:18 executing program 0: 21:04:18 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0xe00, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:18 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:18 executing program 1: 21:04:18 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) ioctl$VIDIOC_ENUMINPUT(r5, 0xc050561a, &(0x7f00000000c0)={0x9, "b8d270c2df4b9057b2d75ae7d082eb2b51d462cb2855ee3200f859f00f37abf4", 0x3, 0x200, 0x5, 0x50007, 0x0, 0x2}) 21:04:18 executing program 0: 21:04:18 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0xfeffffff, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:18 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0xe11, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:18 executing program 1: 21:04:18 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:18 executing program 0: 21:04:18 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0xffffa888, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:18 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x101000, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000000c0)={0x8, 0x6, 0x1, "957c90faeea2c718"}) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r5, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:18 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x110e, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:18 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="180200000000000000000000000000011d0000001c00000095008e06ec820000f72b0bfa8f10076ced94a9766b9e619142fd51514387ffa1db44e7595445fd22196597941e51f39497eff33cb799911851583d4f0d5b6394989aae801d0618dc6caef447139b65795927e5fe7d5e746a46a21b3ddc2bfea5c3c010"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:04:18 executing program 0: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/tcp6\x00') read(r3, &(0x7f0000000000)=""/172, 0x3a5) read(r3, 0x0, 0x0) 21:04:18 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1f00, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:18 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0xffffca88, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:18 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:18 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000080)={@dev, 0x0}, &(0x7f00000000c0)=0x14) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000380)) bind$bt_hci(r1, &(0x7f0000000200)={0x1f, r2, 0x1}, 0xc) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'bcsh0\x00', r2}) close(r4) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000005c0)={'dummy0\x00', &(0x7f0000000740)=ANY=[@ANYBLOB="0400000009000000f7000000a7c3907b76f69e085f1755a958a8a5821d0509a7364b56c3cc59e61bf5a79bb4c501d4d5d3c72728d7a9151eda72933a63ee796b911b1086b9324208205334c9f11ce2617418ad421aae8b129ace5b56db93f9d93d58a52d28270bc283abddd4889a2b5c893d7544112401603ac1a022b2f7eb48ab200f505d353b75b10a0865d5c1571f188bbddd730fb5b7fb3d24bd6d14b154dde535bddb7b81145031f4bd6f2a5597a88e528a58aed53aacc3167b3a7cc487dc1c875bd85bba41a54f370bfe3dd199a9e5af9c43677b234560f32aea599b8ed9adcc2a85b69ea0b3d4553ed5bfb3eab43401f4cab553e7075b9f2551123d06492a2165001e93a7175f55457e"]}) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x2, 0x16, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}]}, 0x50}}, 0x0) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) r7 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r4, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x84084}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x28, r8, 0x400, 0x70bd29, 0x25dfdbff, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, ["", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x4004080) ioctl$EVIOCSMASK(r7, 0x40104593, &(0x7f0000000300)={0x1f, 0x8a, &(0x7f0000000240)="a5f76d8d54c479c009c22ef04592572e44676a23294a08819bbb45a1ac521edf07297c481ffef3bac0d15cd6623bc488afa75ca7ba41b87865ef37483446cf371adc864a9a85e776616d9a26ea5b22f48f020d344728f8f853194fa13e3f07ca3dee6829d2171a65f85e2db19a6a3efe7a920ef5cd32adac679f8f2d4c7109b576c9ea9261258850c0d4"}) sendmsg$tipc(r5, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x4) 21:04:18 executing program 1: add_key$user(&(0x7f0000000000)='user\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) 21:04:18 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2000, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:18 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0xffffdd86, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:18 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') sendfile(r0, r1, 0x0, 0x0) 21:04:19 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2200, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:19 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip6tnl0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 21:04:19 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:19 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0xfffff000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:19 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000300)) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000000)=0x7b5f) 21:04:19 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f00000000c0)=""/18, 0x62}) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) connect$inet(r3, &(0x7f0000000080)={0x2, 0x4e22, @remote}, 0x10) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:19 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2c00, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:19 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:19 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0xfffffffd, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:19 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000100)=@get={0x1, &(0x7f00000001c0)=""/136, 0x80}) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) ioctl$sock_inet_SIOCSARP(r4, 0x8955, &(0x7f0000000080)={{0x2, 0x4e22, @local}, {0x1, @remote}, 0x12, {0x2, 0x4e24, @remote}, 'veth1_to_bridge\x00'}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:19 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x3f00, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:19 executing program 0: pipe(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x4e20, 0x7, @rand_addr="827f11e25e3d705f02489cf5ab520f12", 0x1}, {0xa, 0x4e24, 0x3ff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, 0x4, [0x200, 0xc5, 0x5, 0x3, 0x40, 0x3f, 0x3, 0x1000]}, 0x5c) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_buf(r1, 0x0, 0x6, 0x0, &(0x7f0000000000)) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) 21:04:19 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0xfffffffe, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x8000000ffffffff, 0x4) connect$inet6(r3, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) fcntl$setstatus(r2, 0x4, 0x2000) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "6279ebc55165abfb", "c735c178360e4cee0672fee1b7a74177", "b5b29277", "0273e38bafdad09b"}, 0x28) pipe(&(0x7f0000000080)) splice(r1, 0x0, r2, 0x0, 0x4002, 0x0) 21:04:19 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x4000, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:19 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:19 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x1000000000000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:19 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r1, &(0x7f0000000000)={&(0x7f0000000080), 0x10, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0) 21:04:19 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000280)) process_vm_writev(0x0, &(0x7f0000000080)=[{&(0x7f0000000380)=""/100, 0x64}], 0x1, &(0x7f00000001c0)=[{&(0x7f0000000400)=""/199, 0xc7}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f0000000580)=""/239, 0xef}, {&(0x7f0000000780)=""/4096, 0x1000}], 0x4, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x1, &(0x7f0000000080)=[{0x0}], 0x0) 21:04:19 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x4800, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:19 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:19 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) syz_emit_ethernet(0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, [0x0, 0x9af]}) ioctl(r3, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffd9c) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r4, 0x4c02, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x3f, 0x9, 0x7, 0x10, "61b2621cd922bbd7577241525934f2498e9b7c41f7100244d1a0ff0690fa19a21294dfcf57415d4cec1f18d0ab8fc229133183248a719b55d54bb76e0eb65b63", "90d083a7c1432c5c19308d6451454f33a14b2f2b3265bedf06de14b957f6aa8b", [0x6, 0x5]}) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$nfc_llcp(r4, &(0x7f0000000300)={&(0x7f0000000080)={0x27, 0x0, 0x1, 0xfd3315040955caca, 0x6, 0x1000, "5c0690b55fb2ffe93d438343f8543e9f391f4763749f739a391f86d92f1ae6f328e764397b7e79c98061fbc47325f4b21ecce1866f3ebf744990e23d5716ba", 0x2d}, 0x60, &(0x7f00000002c0)=[{&(0x7f0000000180)="7bb18f8d7de7047c437876d401", 0xd}], 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x108, 0x80}, 0x20008000) 21:04:19 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0xf0ffffffffffff, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:19 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) r2 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r2, &(0x7f0000000240)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_buf(r2, 0x0, 0x4, 0x0, 0x0) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f00000000c0), 0xffffffffffffffdf) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000280)={{0x2, @dev={0xac, 0x14, 0x14, 0x14}, 0x4e22, 0x0, 'none\x00', 0x8, 0xffffffff, 0x16}, {@dev={0xac, 0x14, 0x14, 0x11}, 0x4e22, 0x10000, 0x6, 0x8, 0x80}}, 0x44) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x3, 0x80005, 0xfffffffffffffffd, &(0x7f0000000340)={0x0, 0x0}) close(r5) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x127) mount$9p_fd(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000380)='9p\x00', 0x200000, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_none='cache=none'}, {@afid={'afid', 0x3d, 0x2be}}, {@debug={'debug', 0x3d, 0x1}}, {@cache_loose='cache=loose'}, {@version_L='version=9p2000.L'}, {@cache_mmap='cache=mmap'}, {@noextend='noextend'}, {@nodevmap='nodevmap'}], [{@dont_hash='dont_hash'}, {@subj_user={'subj_user', 0x3d, '\''}}, {@dont_hash='dont_hash'}, {@fsname={'fsname', 0x3d, 'none\x00'}}]}}) ioctl$FS_IOC_SETVERSION(r4, 0x40087602, &(0x7f0000000080)=0x2) sysfs$2(0x2, 0x100000000, &(0x7f0000000200)=""/25) sendmsg$tipc(r6, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r6, 0x0, 0x42, &(0x7f0000000100)={'IDLETIMER\x00'}, &(0x7f00000001c0)=0x1e) 21:04:19 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x4c00, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:19 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:19 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x100000000000000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:20 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)) r1 = socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000080)=@generic={0x2, 0x7, 0x5}) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0xe551, 0x0, 0x0, 0x7f}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xa}) 21:04:20 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x6000, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:20 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:20 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x200000000000000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:20 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x6, 0x4, &(0x7f0000000340)={0x0, 0x0}) close(r5) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x127) r7 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) r8 = fcntl$getown(r4, 0x9) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) ioctl$DRM_IOCTL_GET_CLIENT(r7, 0xc0286405, &(0x7f00000001c0)={0x6, 0x80000001, r8, 0x0, r9, 0x0, 0x800, 0x11aa93dd}) sendmsg$tipc(r6, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) dup3(r2, r1, 0x80000) 21:04:20 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x3, 0x5}]}]}}, &(0x7f0000000140)=""/197, 0x32, 0xc5, 0x1}, 0x20) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0)=0x200, 0x4) 21:04:20 executing program 1: mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000003000/0x4000)=nil) 21:04:20 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:20 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x6800, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:20 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:20 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x300000000000000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:20 executing program 0: mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) mkdir(&(0x7f0000000340)='./file1/file0\x00', 0xc) chdir(&(0x7f0000000000)='./file1/file0\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x4e22, 0x9, @dev={0xfe, 0x80, [], 0x18}, 0x6af7}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="8a56d49f4376fee26bb54224ddc762c53ac4d5ab539d0388cade95ed24c5a9d5541c69fedad4a9ef12c52daef4271600ae5e292cbf5fbbdd1360b961cd54d567fc39205412fe0557fc81a493827ced6fb1cb17802b3e704a86d7526c484f5fea52247186f63449ad5fd075423e1932c04b5233e8a493db68ccde9948e77e1b3c4428cfcf72944e08280fb29fe0a4424362024a370625d45561d76699d17c764a8362b693cc9ddc98d6dcb403c0098655727c5c21989edceb", 0xb8}, {&(0x7f00000001c0)="3ea465e329762ae51c188b37ae906cb6e5385191402ab1644a724c48ff34278fefa83cc96d809892baf5bf36e2beb54932294f", 0x33}, {&(0x7f0000000240)="dbf7232086244fff55af34a63f9bceefad87ab97905c9e05c0848b108411d0d15956c29106e55932e50d6bacd2eb4c49f5ee6679ed025b500179506e507ce76696300585c5", 0x45}, {&(0x7f00000002c0)="f158f23f0935f795996ff4513ef19c03040ff22ed136d0ae5d281bd128da21389b4489dc1bbc3c7b90d8c6a9b69a0cb06f6caaf390faffb02f95a8825a769788a2587bb11d186f95e9ea5f0477b70c39c451a265d4ddb8bec439b12daf04ad0a71aba84b32b355a6", 0x68}, {&(0x7f0000000380)="89f7cf3e39138cc05dc34b9122702df2cac60d9f3ba5d428a32e59803c80bed1d9fb88ab6759a9b69601a73ace34c4395383b199535559b326eb981be242cee1c3f248e73c463b6329f1922078d6338251fd50caf921eacf246250acaad3f1de86da01fbf2d4d721d0001ddb2da2415fa95a4891d71894fa6945f96485d00e20", 0x80}], 0x5}, 0x40000) fstat(r0, &(0x7f0000000740)) 21:04:20 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x28020400) tee(r0, r0, 0x1, 0x8) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x5, 0x200000) getsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000080), &(0x7f0000000240)=0x8) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000100)='./file0\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) lseek(r3, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r3, 0xc0a85352, &(0x7f0000000140)={{0xfffffffffffffffd, 0x1}, 'port1\x00', 0x2, 0x1, 0x4, 0x100, 0x1, 0x21, 0x2, 0x0, 0x2, 0x6}) 21:04:20 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x6c00, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:20 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x7400, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:20 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x400000000000000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:20 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) ioctl$sock_proto_private(r3, 0x89ee, &(0x7f00000001c0)="f0190c48c0e96c2d4c77216253aebcee613180591e971b4843316ec414c5bd9bf1cfef570bd04da7068c32d9f7137b42be59091e3dbbc94dbc3d9ed8ee110b336297fb20c3587197b6222a5ce87391b37b0a15444121c841ad2246337f48472c345e48f5174b9bc14df7db38e4a2f0fcbb2acf02778248f1ebba55eaa4214bdbdee4169f5f8e054c00b21b76608087952df22e6ab7760c2e63b0434a343a4775945c1ffecca50585cf769a7cda7d25ea6ac478fe844f84833f325f181ded245a1931e53f821269893b4f6054b324cd23a253bf724da0d7d56bc54cd7972b7e7282c78ceb39c690bcb0d063eb61") sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:20 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001300)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2800) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000000200)={'filter\x00', 0x4}, 0x68) r3 = accept(r1, &(0x7f0000000000)=@tipc=@id, &(0x7f0000000080)=0x80) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r3, 0x12, 0x2, &(0x7f00000000c0)=""/131, &(0x7f0000000180)=0x83) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="8b", 0x1) recvmmsg(r1, &(0x7f0000006100)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 21:04:20 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0xfffffc62) bind$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x1c) getsockopt$bt_sco_SCO_OPTIONS(0xffffffffffffffff, 0x11, 0x1, 0x0, 0x0) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000040)={{0xc000000000000000, 0x8001}, 0x1, 0x7fff, 0x1ff, {0x800, 0xfff}, 0x7f, 0x7}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) gettid() stat(0x0, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write$9p(r1, &(0x7f0000000800)="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", 0x600) recvfrom$inet(r1, &(0x7f0000000180)=""/70, 0x46, 0x40, &(0x7f0000000200)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1d}}, 0x10) sendfile(r1, r2, 0x0, 0x10000) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) 21:04:20 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x7a00, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:20 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x600000000000000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:20 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x1, 0x2) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x84000) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0xbe7d) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:20 executing program 1: getpgid(0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_INTERRUPT(r0, 0x4004ae86, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000001040)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x18\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf, 0x1f, 0x1fe}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) [ 564.072347] net_ratelimit: 21 callbacks suppressed [ 564.072354] protocol 88fb is buggy, dev hsr_slave_0 [ 564.072383] protocol 88fb is buggy, dev hsr_slave_1 [ 564.077362] protocol 88fb is buggy, dev hsr_slave_1 [ 564.093644] kauditd_printk_skb: 26 callbacks suppressed [ 564.093658] audit: type=1800 audit(1566939860.762:284): pid=31368 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16930 res=0 21:04:20 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0xd203, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:20 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x700000000000000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:20 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:20 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)) syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x80000001, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/enforce\x00', 0x410200, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) ioctl$SIOCGETLINKNAME(r1, 0x89e0, &(0x7f0000000080)={0x4, 0x3}) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) [ 564.209051] audit: type=1804 audit(1566939860.792:285): pid=31368 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir880786490/syzkaller.Ccwc1T/828/file0" dev="sda1" ino=16930 res=1 21:04:21 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0xedc0, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:21 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x800000000000000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:21 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:21 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='sysfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x100000, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/\x00'], 0x2) mount$fuse(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x7a04, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) delete_module(&(0x7f0000000040)='sysfs\x00', 0x800) 21:04:21 executing program 3: socketpair(0x11, 0x80000, 0x2000, &(0x7f0000000080)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:21 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x40000, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:21 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000240)='/dev/dsp#\x00', 0x101, 0x10000) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000280)) r1 = socket$caif_stream(0x25, 0x1, 0x3) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000000)=0x0) migrate_pages(r2, 0x9f, &(0x7f0000000040)=0x7fffffff, &(0x7f0000000200)=0x8) r3 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x40a80) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r3, 0xc4c85513, &(0x7f00000000c0)={{0xb, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 21:04:21 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x806000000000000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:21 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x3}, 0x0) 21:04:21 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0xe0000, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:21 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0xb00000000000000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:21 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x108) r2 = open(&(0x7f0000000100)='./file0\x00', 0x400, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r3, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x2000, 0x0) ioctl$UFFDIO_UNREGISTER(r4, 0x8010aa01, &(0x7f00000000c0)={&(0x7f0000ff9000/0x4000)=nil, 0x4000}) 21:04:21 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x806000000000000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:21 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x4}, 0x0) 21:04:21 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1fffff, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:21 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9}) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$FUSE_POLL(r1, &(0x7f0000000080)={0x18, 0x38eb4b10d11a037b, 0x6, {0x4}}, 0x18) r2 = syz_open_pts(r0, 0x1) ioctl$KVM_GET_FPU(r1, 0x81a0ae8c, &(0x7f0000000200)) fcntl$setstatus(r2, 0x4, 0x102800) fsetxattr$security_selinux(r2, &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000180)='system_u:object_r:apt_var_log_t:s0\x00', 0x23, 0x2) write$FUSE_NOTIFY_DELETE(r1, &(0x7f00000003c0)={0x33, 0x6, 0x0, {0x4, 0x3, 0xa, 0x0, '/dev/ptmx\x00'}}, 0x33) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000400)) write(r2, &(0x7f0000000000)="d5", 0xfffffedf) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 21:04:21 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0xd00000000000000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:21 executing program 1: perf_event_open(&(0x7f0000000680)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') ioctl$VFIO_SET_IOMMU(r0, 0x3b66, 0xbd75a22f7b940153) sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x140819e}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)={0x14c, r1, 0x100, 0x8, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}]}, @TIPC_NLA_BEARER={0x38, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7713}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}]}, @TIPC_NLA_LINK={0x50, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}]}, @TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}]}, @TIPC_NLA_LINK={0x84, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}]}, 0x14c}, 0x1, 0x0, 0x0, 0x99571dd8039bbbee}, 0x4000) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x111000, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000500), &(0x7f0000000080)=0xb) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/create\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r2, 0x80045530, &(0x7f0000000180)=""/89) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'bridge_slave_0\x00'}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000081580070f00"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x1c}}, 0x0) 21:04:21 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x6b6b6b, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:21 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x300}, 0x0) 21:04:21 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) stat(&(0x7f0000000700)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r1, r2, r3) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000680)=@assoc_value={0x0}, &(0x7f00000006c0)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000740)={r5, 0x4}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e24, @local}}, 0x5, 0x4}, &(0x7f0000000380)=0x90) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000003c0)={r6, @in={{0x2, 0x4e24, @broadcast}}, 0x0, 0xcf, 0x8, 0x59e, 0x9}, &(0x7f0000000480)=0x98) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000780), &(0x7f00000007c0)=0xb) io_setup(0x9, &(0x7f0000000080)=0x0) io_pgetevents(r7, 0x3ff, 0x5, &(0x7f0000000900)=[{}, {}, {}, {}, {}], &(0x7f00000009c0), &(0x7f0000000a40)={&(0x7f0000000a00), 0x8}) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000640)=0x4, 0x4) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f00000004c0), &(0x7f0000000500)=0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r10 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x101) ioctl$TIOCOUTQ(r10, 0x5411, &(0x7f0000000580)) ioctl$TUNSETTXFILTER(r8, 0x400454d1, &(0x7f0000000800)=ANY=[@ANYBLOB="0100362fd3c000de5c930400aaaaaaaaaaaa7f633c3fc84aaaaaaaaa8b3dd140508d19435e550bb01b9314bdf5a2cd2adad41196f54dab1c792c38e2cdb63c25d8b84c762522d3bce7f932f3ae47aec58bdec48ae20448a34092c32e6ebeec314d90c727c409cf10604cc579043b0af67de0862580e2d105b2b98122cc39b654bd1d463f42a0a21469e8bbc18510b446bd785f4feeac57c0ef174f4d1fd09b96ad90588d61df6afb4919ebbe0827e73116352078d576922645c8ac83ff89dda9b0eb"]) setsockopt$SO_TIMESTAMP(r8, 0x1, 0x7f, &(0x7f0000000540)=0x4, 0x4) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f00000005c0)={{0x2, 0x4e20, @empty}, {0x1, @local}, 0x10, {0x2, 0x4e20, @broadcast}, 'bcsf0\x00'}) r11 = socket$rds(0x15, 0x5, 0x0) setsockopt$sock_attach_bpf(r11, 0x1, 0x32, &(0x7f0000000040), 0x4) close(r8) setsockopt$sock_attach_bpf(r9, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r9, &(0x7f0000000000)={&(0x7f0000000040), 0x392, 0x0, 0xffffffffffffff13}, 0x0) [ 565.030418] audit: type=1400 audit(1566939861.692:286): avc: denied { associate } for pid=31456 comm="syz-executor.0" name="0" dev="devpts" ino=3 scontext=system_u:object_r:apt_var_log_t:s0 tcontext=system_u:object_r:devpts_t:s0 tclass=filesystem permissive=1 [ 565.032344] protocol 88fb is buggy, dev hsr_slave_0 [ 565.059084] protocol 88fb is buggy, dev hsr_slave_1 21:04:21 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x1000000000000000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 565.111037] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43 sclass=netlink_route_socket pig=31461 comm=syz-executor.1 21:04:21 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1000000, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:21 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r1, 0x89e8) getsockopt$bt_sco_SCO_CONNINFO(r1, 0x11, 0x2, &(0x7f00000000c0)=""/103, &(0x7f0000000140)=0x67) ioctl$sock_proto_private(r1, 0x89ef, &(0x7f0000000180)="8424335905f3c6833672650bbc5ecd4b3c7a7e9dacfc0ec82b9a305b45848dbecf6cda1cc19d1adba307651369fcb09c5031e7d250964b54ae3f6c0bbed5f570ad02ccd6d681bc4c643ed12b305f86b02135c62dccd1cd7bd6c7d9322cf442e7d8cd85050e2d5775dba87d2deef9c7ca4c12dc9b7a5b2e574123b8e4156966e4cbde73b673c803ecdd20c72ea22c2b95e3846cb328a595f9daef012e4382aca0cb5518ed401d4e1fb03fcc7ea1bbf7906f9c7aaaa2f3cc9e7f9bbbaf10362d299e891bfaff134358449fb2c80659a46493de7ecebfca27dbf2876775c0797703b13f8fafba76eda0d7d44fbc7a48fbe90e67e496f95bff34ad") getsockopt$inet6_buf(r1, 0x29, 0xd3, &(0x7f0000000000)=""/68, &(0x7f00000002c0)=0x44) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, &(0x7f0000000380)={0x1, 0xffffffffffff5497}) listen(r0, 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000300)=[@in6={0xa, 0x4e22, 0x100, @mcast2, 0x5}, @in6={0xa, 0x4e20, 0x9, @loopback, 0x2}, @in={0x2, 0x4e20, @local}, @in6={0xa, 0x4e20, 0x2c55, @mcast2, 0x8}], 0x64) [ 565.192378] protocol 88fb is buggy, dev hsr_slave_0 [ 565.192413] protocol 88fb is buggy, dev hsr_slave_1 [ 565.197479] protocol 88fb is buggy, dev hsr_slave_1 [ 565.202570] protocol 88fb is buggy, dev hsr_slave_0 [ 565.212592] protocol 88fb is buggy, dev hsr_slave_1 21:04:21 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000940)=0x7b) read$char_usb(r0, &(0x7f00000002c0)=""/100, 0x36) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000080)=0x7, 0x4) ioctl$UI_GET_VERSION(r0, 0x8004552d, &(0x7f0000000000)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, 0x0, 0x0) [ 565.233274] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=32789 sclass=netlink_route_socket pig=31461 comm=syz-executor.1 21:04:21 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x3f00}, 0x0) 21:04:22 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x1400000000000000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 565.312121] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43 sclass=netlink_route_socket pig=31473 comm=syz-executor.1 21:04:22 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) clock_getres(0x5, &(0x7f00000001c0)) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) sendmsg$can_bcm(r5, &(0x7f0000000480)={&(0x7f0000000300), 0x10, &(0x7f0000000440)={&(0x7f00000003c0)={0x7, 0x10, 0x101, {0x0, 0x7530}, {r6, r7/1000+30000}, {0x2, 0x12daf312, 0xffff}, 0x1, @canfd={{0x4, 0x75f, 0xde, 0x7fff}, 0x1e, 0x3, 0x0, 0x0, "bf5ad1089d4902e201a84fa41c3b0a5231ddf53ca7ed4691820a93ad68dadf9266adb7440a1404d05d8da243680ff037b6ac77353ed4f3143bc0e49eb1b35de0"}}, 0x80}, 0x1, 0x0, 0x0, 0x4}, 0xd2f79b9f758a2362) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xbf8e2d2db4f82d59}, 0xc, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b000b40300", @ANYRES16=r8, @ANYBLOB="080025bd7000fbdbdf250f0000000c000100080004004e210000080004000400000008000500050000003000020008000d00000000000800030003000000140001000000000000000000000000000000000108000d0000000000080005000600000034000200080002004e20000008000b000a00000008000b000200000008000b000a00000008000e004e24000008000600010100001400020008000900000001000800080005000000"], 0xb0}, 0x1, 0x0, 0x0, 0x4000}, 0x10) sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000600)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000640)={&(0x7f0000000240)={0x2c, r8, 0xff92d22f2d09a0ef, 0x70bd25, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x59}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x8000) 21:04:22 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2000000, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) [ 565.387797] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=32789 sclass=netlink_route_socket pig=31473 comm=syz-executor.1 21:04:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x80000) setsockopt$inet_buf(r2, 0x0, 0xba575dc10d59bf5b, &(0x7f0000000100)="c60604f32c5c0cd1ecbf3cfa33c70a13e209fa1e162afab70252f4eea3dbd37c59e49c009e58c1dce508745dc739fb2c28d6232db88f46f64596da0cc5134025e5c66e29dd142afdafdacc5b1b961f92f6af83bd24d675e4", 0x58) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x8000, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000080)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) dup2(r1, r0) 21:04:22 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x101d0}, 0x0) 21:04:22 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x1800000000000000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:22 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x3000000, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:22 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_GET_FEATURES(r3, 0x8008af00, &(0x7f00000000c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r5, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:22 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x2000000000000000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:22 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000940)=0x7b) read$char_usb(r0, &(0x7f00000002c0)=""/100, 0x36) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000080)=0x7, 0x4) ioctl$UI_GET_VERSION(r0, 0x8004552d, &(0x7f0000000000)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, 0x0, 0x0) 21:04:22 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x4000000, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:22 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x40000}, 0x0) 21:04:22 executing program 1: perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) epoll_pwait(0xffffffffffffffff, 0x0, 0x0, 0xb0, 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x5, 0x60000) epoll_pwait(r1, &(0x7f0000000100)=[{}, {}], 0x2, 0x3, &(0x7f0000000140)={0x4}, 0x8) r2 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ftruncate(0xffffffffffffffff, 0x7f) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r2, 0x29, 0x45, &(0x7f00000001c0)={'HL\x00'}, &(0x7f0000000240)=0x1e) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, 0x0, &(0x7f0000000180)) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x11) dup3(r0, r3, 0x0) epoll_pwait(r4, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x81}, 0x8) 21:04:22 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x2600000000000000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:22 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x5000000, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:22 executing program 3: r0 = syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x80000000, 0x4043) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000200)=0x5b9, 0x4) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)={0x7c, r3, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @dev={0xfe, 0x80, [], 0x1e}}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x3ff}, @SEG6_ATTR_ALGID={0x8, 0x6, 0xffffffff}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7400000}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x8]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xf09}, @SEG6_ATTR_DST={0x14, 0x1, @dev={0xfe, 0x80, [], 0x1f}}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x6}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3888}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4000000}, 0xc20ac194a6ed8941) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) write$char_usb(r0, &(0x7f0000000440)="25bb2ac7609741cf74389e3a9663fe6b59b7e79fb88fac24b1a098e87e8d6814d4fab04e035fd53f833fa2e76729a622b25d9a9685355f4d9fcba4d968e4ce97e9c81a34b9b4dfea5a6617ad36292ba79cbac528a5cca68818b8f3bc3a98d77b7a76b655fdde00a6a7a4096de31f7a6d84936208aa4a1bcc5116fa66225daadbc861daca2e7e87d489055162ad96259462803acb11d8645a53d387571d829b1fe6ac", 0xa2) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x200, 0x0) timerfd_gettime(r5, &(0x7f00000000c0)) faccessat(r5, &(0x7f0000000240)='./file0\x00', 0x20, 0x1100) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r6) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r7, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r5, 0x84, 0x21, &(0x7f0000000100)=0x9, 0x4) 21:04:22 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x1000000}, 0x0) 21:04:22 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040)=@id={0x1e, 0x3, 0x1, {0xa484}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0) 21:04:22 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x6000000, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:22 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x2800000000000000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:22 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000001540)={@broadcast, @loopback, 0x0}, &(0x7f0000001580)=0xc) sendmsg$can_raw(r0, &(0x7f0000001680)={&(0x7f00000015c0)={0x1d, r1}, 0x10, &(0x7f0000001640)={&(0x7f0000001600)=@can={{0x1, 0x58e9, 0x6, 0x5}, 0x6, 0x2, 0x0, 0x0, "b3c3f901e3bcfc0f"}, 0x10}, 0x1, 0x0, 0x0, 0x8000}, 0x44000) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000100)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100080c1001022000000004fcff", 0x58}], 0x1) syncfs(r2) 21:04:22 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x3000000}, 0x0) 21:04:22 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x4000000000000000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:22 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@loopback, @in6=@initdev}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @initdev}}}, &(0x7f0000000080)=0xe8) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:22 executing program 1: r0 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0xffffffff, @my=0x0}, 0x10, 0x800) ioctl(r0, 0x80, &(0x7f0000000040)="d1a99baf8b30c71c7b52547b637bfb0fb992838472de4c7d40b258820f3deb8e658e5f02668e05fae325b3789c2189948ae8e7108e10551a37b350c181d45b7133a9da49a06f80c0abe9477acf7305f395c0da9fce8686087daa062e446242024df35537d9ef1b9f51d458d0b54698cb4ae60b921f0e1e97b5d5780247bb2237e01e8527b3726108f06838") r1 = socket$inet_udplite(0x2, 0x2, 0x88) clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f0000000240)={'NETMAP\x00'}, &(0x7f0000000280)=0x1e) 21:04:22 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x7000000, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:22 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) fallocate(r0, 0x11, 0x0, 0x100000001) 21:04:23 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x4305000000000000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:23 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x1542da66}, 0x0) 21:04:23 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000002580)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r3, 0x400442c8, &(0x7f00000025c0)={r0, 0x6, 0xfffffffffffffffd, "93e97e47630224e5e639e9e4a8ff8dd47806b25c0cafc37ab55783d2183d044335f4660270f2b26a19a17b6e88dc713d2bc45e5feda2b8652284e7842be158bfa2f6a425fe5039b9f2148e591cb264c9392f98baeb10739938f7255c9fb3c8e98a68019bda06d8a7fca411823e9c6530ae1f0a57242caea678796b57bc300a672c882aabf08db94aa8ec64dde06b5a"}) bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'rmd128-generic\x00'}, 0x58) sendmmsg$sock(r0, &(0x7f0000002680)=[{{&(0x7f0000000080)=@nfc={0x27, 0x0, 0x1, 0x1}, 0x80, &(0x7f00000023c0)=[{&(0x7f0000000100)="0407d398138272abcc43f4e945f6613ec0a5d87a", 0x14}, {&(0x7f00000003c0)="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", 0x1000}, {&(0x7f0000000140)="c34ad32deebba573bb4faccd3b84a6ba2cf3934fe40aca8aa339eef031a532f610f8f11814ddd6a1abdb014a10bf54924ceb92ae595f877f256d36807693ea4d4301999d5ed5784847cb87", 0x4b}, {&(0x7f00000001c0)="1be1c736308b522cf0286876de0a2b1aeaebd1aa52597f7e1ffdea2df6984e41e44b9e2b2ac0afc8fd0260ef75cf041e23727fda0f4b02eee65b500d8cf7df49243b5425e5b3a6d50f70c3e73ec214ef40918a2700aeb785885732e2b1bb7d3c98d06bad0a9ed069a44fac2ba805973a9b665fb548e4874a1792a024e5402db3a94e8c862af0bb33183f5305f4bdf0e8bcea7c51ea7ca19e56cbb700573ba833cb5639b89bc5e9e243dead1681e8d5d4800cb2987bada34c327137800ea97bdada35bba00d10ab6f6752c70240", 0xcd}, {&(0x7f00000002c0)="77c9c903b0ee2818fe70052ff005f21db04dd5e384f45d330f93ac2057df20ac2b59129b79c61702e0e3725682528cdca72987d76d294fe32b78f4363ba07bb19c4bd901b1b60f199a10de94dad3886df098aa767a21dd61cd88117865c9edad36886db134112885c87e943f80524fc5603e174528998ccd6bf9302699daf4af59e329040289a6084cf9821eaa1478a340ba885da9ea56f6", 0x98}, {&(0x7f00000013c0)="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", 0x1000}], 0x6, &(0x7f0000002440)=[@timestamping={{0x14, 0x1, 0x25, 0x2}}, @timestamping={{0x14, 0x1, 0x25, 0x4}}, @txtime={{0x18, 0x1, 0x3d, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0x9}}, @txtime={{0x18, 0x1, 0x3d, 0x3}}, @mark={{0x14, 0x1, 0x24, 0x81}}, @timestamping={{0x14, 0x1, 0x25, 0xee5}}], 0xa8}}, {{&(0x7f0000002500)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x2, 0x4, 0x2, {0xa, 0x4e21, 0x7, @dev={0xfe, 0x80, [], 0x10}, 0x5}}}, 0x80, &(0x7f0000002600)}}, {{0x0, 0x0, &(0x7f0000002640)}}], 0x3, 0x4000000) r4 = accept$alg(r2, 0x0, 0x0) sendmmsg(r4, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 21:04:23 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0xfffffffffffffd52) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:23 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x8000000, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:23 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) write$P9_RLCREATE(r1, 0x0, 0x0) listen(r0, 0x4000081) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x7367f48bc38c88ba) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 21:04:23 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x9000000, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:23 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x3f000000}, 0x0) 21:04:23 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x6000000000000000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:23 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x3) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) r5 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x48000000000, 0x88002) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000100)={0x0}) ioctl$DRM_IOCTL_GEM_OPEN(r5, 0xc010640b, &(0x7f00000001c0)={0x0, r6, 0xf1}) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) r7 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x80000, 0x0) ioctl$NBD_SET_FLAGS(r7, 0xab0a, 0xfa0) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendto(r0, &(0x7f00000001c0)="f7deb1f7c4ed24afacaa3a0aea271dc2896fba9c695bf40ec49249fd9d5c3fa964d0d7c8b0e17cfd62c1fa10319c5a8ac3d77721b69d39b53b99085ac78a821a1bf416a25fcd65133b1a04334f3ddef401f6ff55533f7a53cb06fa26f903650e0ea528ff4758546b540c0f43d3d53f9f3db3684197303f271f6bfd6d5f5fefe639e287ed56f6c866b682f95aff616ddd5ce4e9cc880654f889649a96fe00679485f33d1684eabe52da905692ede99e1a0b01e907197ab10d97f6920926c34253437118b66e6a430c12209293d7e961d7c0844311fae2db0d152b514592b1df95d6384b59a1441e4cb1d75548aac61696cabb555dd8", 0xf5, 0x4000004, &(0x7f0000000080)=@nl=@proc={0x10, 0x0, 0x25dfdbfd, 0x1fb5a6d3c7629faf}, 0x80) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$hfs(&(0x7f0000000140)='hfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='uid=', @ANYRESHEX=r1, @ANYBLOB="2c87f736a804ac4fbe74e24e65be3417015aa84a2a817ee6c8ae3354616eaf4ec60b44877573d1006b24c4b7caeee8fce8ed04fec0770f62fea5"]) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f00000002c0)='./file0\x00', 0xf9, 0x6, &(0x7f0000002500)=[{&(0x7f0000000300)="bdda9e96261bf853eaeedf92a00e42843323906c647d36eecf4a9b3a79543975cf1a", 0x22, 0x2}, {&(0x7f0000000400)="68bf442108059dbb77e00e2a64a7e861394dde5c5285acb1823a823361e07033c1d1faef3f9050dd7b1a7a167793bac47156857059f9c940b8c5aecfca1d38e9c4eb76d0d8f0303dc2ba97bb21ac3ec133ac1df863519959f3899512cc014e4bcabf7d3e4f4295a8480e037b7e51ea1ab3ed42dd6cdb94acc245f7841fd4101b4689147603c9dbfc1b8f4a593292983798684735751b053077c044c794c9397a0569dab478e298caa98e0829c4d72b48098540fdac0dcc72c002ac97b70195228646f6c3fa35201fd20a3cf354278b492270a25a23822c2b9150378703c6ca638484fe4965ea173e3daac1620f0b5b1ec06cabefd18e162c7e4e12eb4b45e42223ac09eac71a44b85139e2d6527321a15385870b16ffe44fb23bce33d91052236c2475fc1edcf5664dec9577422673b9305e2e3998a36027a62cfcf714da54b4d5a2f2dffb1dd140626f63e78506b641438c76f8ebf3e547e02188fdce5cc643f582eafbed644799ae46c9106698084872c3c3e34c5ee8bea88f6657e7d25df95d87c3827daa8efded5a7536ab3f3f0d89a6e9035c3dab63e9728612c0e815929197cab512d100eefdffc799bf1e2dd311036a4249fdd5d5e02e79c67b9f6782dbf76fde17b70eb57ad97d5ea54ef7272cac0a38173da739d54075800066481dddf9590431e4066f3d8c32139418f21ca81635dddf3c236397deeedfaec1e3b1666b33c1859b496c8a57923032080df700c24cfb8371797ef4d86946a9d1a8a946c5bb0439811a24233b99484067f0933e30e113d6409acf05e413b06f95106299c3ff3d7b1dd784b81291792d02a99e500f1c461871edeb191f5cf4184de81f0088ad7ffe89af5c27ee4ceca4b7be0091d3de3d819915cad4317a2bf1d6ccc9196cb302739c3c64d822a5deeba197cf4fe2f71d7b46ea46c39b2a4053e42904f9ff76c2f38d7a6e1d802da8beffa9483faf902d06ac2bf4789312939a0e6af8928f42ba84dfa61de3e4a9f71865b91a6f1dd5dcb9ac64d1fa725e9d33b56a3eb140220d01f33ac2c9209aa713989ee086252ece1f37157d308254c7dcce93f78683cbaec07706ccf1a008b3b6da09ed36a768dfce510e096f37ef4932c82b933ef7854631a4914b8831cbbd6e341aca19e81fdf8666acab745bc39c0f0bca74173c7a47fdee7fd779c64623bccbb3d0cf44b2d0cb924a56d2cafddcbe1225cc4b59f9e4615d293e24fcf5ae6839ee3ba48893c37ee2d86197f52125fcf6da2a2506cffd19760063b76aa8bc516490fc2747a64ba6d4c4e290d519bab93f566c7241c2f33b4d874cb52683af460a266d9070f862b6d9d55a8fa57efc0585429ecb29aa7d924d45da3b42a3782ca256dcbc56738e196c9d4eac4a3c90c9765f17a1339f528647aa522b70a80adc73c3f3e59b437e4aad56233450335b90282b2f7850da41a02026127df71b14e50aa1a4fbf1c515ab954ce7fa6b6784521e5ce4e4a6868097dd0789e3ec96959829ef583f482f9c84d8dd668bfeb1cb24b752f8c473ec51c38dd6ea38a76e58b40227738b4d1a5984215117b668a6f5e4a07c1a3c0205376b14ffd4ad64fb30e5cb09268e97557c55dbdb1e178e439f8010e23401608ccd459806fc9d303e628cec89195b061aa53eb4460647ca1a185161c72ac0268422687d587cf5214e47bd63dea67c8f88db642839a16c121a9cfd2e2926f53deff6eb6535fd49dc9222b3c385d472aa662c17a818190bb56e944ff86b6f496f58e62b55d07670522927326146aef999511b98718e6dee55b0fcef0677bdf25c5d370cc51b74a461f8f25a3a706bdf087ee0edcc149fa6908bb5224f0234343eac49f451b230cba36280e90c39cc02b9823f2dfcae01fb4289c94a0368a19861563190be9ba78726a5c564c298d91df3420c89d90b066c8d6e4b2648faaef657fbdad18bed43b8be1b5dd0ed8db3c1a5e2d4897a1e6f0c9dae2df8115f481d14de8621e626644fe34bb2d49bdbfc1d21401333f1447b5761cd4e6d5761a155d54e1893bd8bc0cc8eeed7e40532966e72f74fb4b3d32b47f2fe0d59e22f2a007573ea388e675e9d61c182d5eb6aceae89016ed8c3c7ccf36b018e198deeaadb41a780a3180bcf83b471bff9e0f593b7efbbfebbef37614b8a0ce26688cdb8f0bb8d8c691fbe44937105f6061573072eebbe1310e120ab1a225dfe779dd93c948a86102d33a64fe24909b758782cbf8aa7ccc5b6919f5e7a07342cf64923db00a20b0887d74eda71a44d663c0ef64d3cdbe0a0dee7e2cff7ba8135ed90f2102af734e22cafec88fe88a15455c8edf69fbb6ca76f1e72e7ae1f426d7b2cd27159472579b29003025ba2324757e8699e904cb1625ffe4db26201af706927939f6f097204a009dc7d23c6b9825195caecef702fd339e4d541287284d277601f6f9974aa6364b48881904223e3d96308bec155f2c8c514ac7fece1014193b8206b2e3b564606dfbf65fd32cd8e7ba3a649b1f5e7e534e91e529a9ecdc321c00ab5ba3c11247b146c2c839ad1ca45452e49477996f1b5a2c02a57ae0e0225303c69451de1a97845df6a87ac4511c2fd714be6fbb69db8464cb20450de59afc4e8762ee38ef81a870710b1a42f668d3cf71c7551bda47916443c2f22a03c6cb4cce9a99913ed66fa5b8631efacdb705efbd118a8d721ae404e9219893ec3a458fc21344b0560f8224e3e8b109f2c79b5f8d42bdb8752756191fe45e56b7d4abf8a0100e67e4121faa5d4d808c613320100b193b216fcddab10480a9211e0ca4b43c043eb4b005e26278dff43d054c00514e1147c4933dd8323941e3f6f1bf438ac25d39fdb14afec79fb623893d5dc6eb53d8c6f4e8a384b5b17c6ca803be5dc44fc1f000e7ba3bfa9eae08876b2c954577928b18cc6d74f40b41f81a72bac756f2ebfbb63cf7f1d005e8c1831e3ed8fffeaf2468bb96c3f12d2d5883b5e9fb0a74c8d8d7b59b5c416d067760fd739a4579f65e9e14ae852e8539bbd8796ee5af5e8d802de26c3375bd8ae3418a751dfbcfad468ac23cf87a576a88fed2379499a8f5b9fb90554558f31dc2240963cd11787c90011bcf29881c946c03c95759d90f87637e40f2ac43b03a2924ca88c400dc6dde0875d2803ca9d8e593eb4a424122aa8c79442abc9330ed0abe667a8b741e27cb092bb1ed00ed6ad42b14b8092776d293af5fbc4e0867f365186c6045dd63c7284023b12fc9edcfd11a8fdfc6f0e2547ff73ee9314c87ede804cd1d0afc9346d4ed347607901d15d655bed12e9c3f1eed315f17b5fd1d0f64364818fb5343183b28329e42b9cec408d59c49c0efb2e26488d92992ca40f04a317b60145fa59427473b042d316b06f353a3198445a12dc770d5d5e547f6bed6c87cddb1da43d616ff393c98462b286bc373ed78d480117b5112569aef12d23eea0af20ea94818b123c724ca1079481ba7bf05a2447466a57f92c43faa9326e7526c9d26dba064a34db5e266e016a2643ceb85d582ab760f0cdee578489fb8c3b35ae139ff62ad380e94382fa5b4d970f6f8bbfa5d9752e82118bdd6d0f9ae64c6e2b017967a249b08d6b5c56dfcb64a2ced0868e5fd623f1c62435b8d177e4c425dafefd20a1d75dfb5099a45dd310ef61171d13700d1fb84e316e880701152db91bf227cad76d3707f2749ef3ef0f665e59b93bdb08d15fc633155d27fe25d3633533514c889d74d2c5def4446bda85defc934642195a51f0176fecbef739e5e70385f0be82c4683de5ad9e089fed959834434b4b64f8c53f73b1c9e3eecbb8a025ced6783b48a36f7d657c80c6b65e4c3f60c837220f066bf23662726e0b9191b595b2c4ac304ca1e17e2b4d44f0f50b1524c7559208285b9f958246af9f3fea1f981952ff1f0d149d75fdfa328b7a5eaff8ae2f51c98d863e99122b3770d8a5ab5cd72da3763f3e03235e36555a23e2e4c89172deda2dc0b72f975a825db04b5a1193543cb7ab4eee27ff555fd12278c9ff1128c9686ca0a719cdb22e7ff75609cf5ef6edbdb2736d027d5eb443c6793aad6994f3116332cbd3fb1e2a41962d63b790784d8cd49ad92fb439250fcdd05fa541769487106366daa67322eb2757aeac5c7aaf682d98509171bd1b5c94d3faed48e1ac56d959b9447e6fffe2511627e9787ccf167bee239e4db6237b247c3c33c9049e83d53609aa098b856acd154e855a227a9782b6aec64d13e1a346c22afaefc5a0243ea90036fe973bb077c2e732c904b702fcbc2424f834cd6cd67dc2ace11b6ab530327d4b662a1e212c2a7f998d2fba640600d2e0a0a7acf1ebc900d0a31e97fa6f6b81fecc90a4ca81edb4518297bc12b58be725310280c52b69a8b23c4ab52c859aa672b1fbe29b07d18c68f63cfb4a52af23a2751b4a3dee8316afa9d4246fce3d51da11174500b2f17ab3150cdda49ecf8e21b3c683cc0f67b3f116679c3f52f8d091002b1ee934a8cf5dc6e24ef28360fd0b387a84114d3f74c21c699a68b75f07d89873d34916afc621b7204fe35dccce57376e7f6541abcf63c4804d2eddae0481c64bdbf6de5ab08e7f51a113569b14feee75660a48c9a895c8747ccb879a269a84454dc78b4a471ab97289096223569f3f9d84d049ac05327e2dfc7c416f6dee07e6ff850dfb4b99251c630e24ae97f9cc2de07d6d6c8b48d1af3ec1cff93635520fb33d83a15fb395504ee39c51eaad4c10809ad696127ca715a0e56e5521696ce0a1bfb04b01c2053b69c240220fa46de4875dfab6c93a98480689d0904836cdac8b23e39adfeedc4c4b64add261af11677168e296ba0c26f3e60a6555ff267b3524341869794646521e488d4120d0e760fd4061fea8e085904bba922a79cbbd67f97c68570ed3b809274cdb246284364cb799c2505d30b5ab32b215289fc97562af1593a46260db120d21c9b6deb8baeb5ba9c73e00f10513d9b277bd76bb7111618e61f776050f78dcaa64d72b9858a0a2e19a853790fc65c863631b67d50e3e7fd6e771967dae4d43786b640ebba52a6224024a2f159ec3a039442e58a1855197ae92bcf1e66a4c46c1777ebf844834b3f900ae9c4e7836758c8d9d87e84487c1f85cbdc9db805e179ca19379199e3a4d783c72f8e2dd70f09af4be6d76ce8c06b3887950566a52ac0c89a371e9dd7a9e77ece36b830c7447bbd02fd02e40b632f25597e83ca4e3059c954c7b3028fbfb509dc11cb591fb7fa4e234b4d2cccafc0411ed669e1c81da9e6ab5cceee608a4e7ff7f06b7a8dd79f58a2cff749c7b4c698b3d04723c934fd082a44a5290f92fbe7d469678c77751601a9a48dfe4d8d49051979bc6d453065d1274c8ae35f622aecdd6b9936eaae0940a6bafc30b2be9b89161a6eeb04b49262f32739f438ea4c081b6d45bfefc7c20276fe5d4078121417eb3d8af6740d7f6d5592c4716ec5bdf783b51ba5ae717cd5c9e1843ca95fc3e4347c855c1023fd7afe43cc685c9580ba562f047087ddb580b0f8280ff9ec05a74880c1dfe407e15488cb839a3af09741f13c22105a9137b05c0d8c4f990b822184b9700d45b57e40cbbdc1c3ec150098967138f5144c874f1b7b5e811cabaab9b9f8322f0fbbebfc6f1d821b75327f6badb28ffe6220aab2fb3ec9a9b712c8782df6de303f34126c8ebdc10db0ee42f0045492a65239eb52681cbc588b42d4728f68ddccbe6bfdfa13a6a2f40e119368ef9782057200d98888c3f86152e728b05dba9719d96f7bcb96df0e60fc2c5ac09ef915c99e2fe", 0x1000, 0x3ff}, {&(0x7f0000000340)="64e317af6e0b1e45d70527a0c0622ae87f7ea4dec341f24eb44b149e58777abdd7ee40613237927ca5873671e46c7797c47ad7c4bb8a65", 0x37, 0x81}, {&(0x7f0000001400), 0x0, 0xfff}, {&(0x7f0000001440)="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", 0x1000, 0x10000}, {&(0x7f0000002440)="70b360fb5a37c76e4e52e8f6c6d5de44b16c2edaff13cf038ae93c0ed2ae7c11849977fa0fe8cd79b354c8f3bb63d07b1f874a305048d4041274b3b737a77a6b691bcf1516644a0abefc93b845a1de3cdc45c2fe804da672a1d16cb09a7dadd7c0f45a7cd0e4cc3a27613716b80a6a64a745f4d52b304b4f8e18c00c4f757ddd852168342dca90306385", 0x8a, 0x2}], 0x0, &(0x7f00000025c0)={[{@nodots='nodots'}, {@dots='dots'}], [{@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@fsname={'fsname', 0x3d, 'posix_acl_accessem1:+'}}, {@fowner_gt={'fowner>', r1}}]}) 21:04:23 executing program 1: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='/dev/input/evect#\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e000000100000000000000000004000000000000000000000000000000000000010000038000003"], 0x3a) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x2, 0xa1fc250b971183ea) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f00000000c0)) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 21:04:23 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0xa000000, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:23 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x800e000000000000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:23 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x66da4215}, 0x0) 21:04:23 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) exit(0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x4000, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x4, 0x70, 0x5, 0x1f, 0x4, 0x8000, 0x0, 0xca1, 0x0, 0x8, 0x3, 0x1, 0x7, 0x3, 0x2, 0x7, 0x81, 0x1, 0x80000001, 0x2, 0x1, 0x1000, 0x100000001, 0x100000001, 0x800000000000000, 0x3, 0x400, 0x0, 0x4, 0x1ff, 0xffffffffffffff7f, 0x8000, 0x80, 0xff, 0x6, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x5, 0x89e}, 0x800, 0x4, 0x3edf, 0x8, 0x8000, 0x5, 0x1ff}, r1, 0x10, r0, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) getsockopt$SO_TIMESTAMP(r2, 0x1, 0x1d, &(0x7f0000000000), &(0x7f0000000040)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x21}}}, 0x7, 0x4, 0x1, 0x3, 0x6}, &(0x7f0000000180)=0x98) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000001c0)={r3, 0x6}, &(0x7f0000000200)=0x8) 21:04:23 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c, 0x100000000000000}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:23 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000001c0)='./file0\x00', 0x800000000e001, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16, 0x2}], 0x100000000, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x8000, 0x101000) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r0, 0x800443d2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{}]}) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='vfat\x00', r1}, 0x10) fchdir(r1) ioctl$TCXONC(r1, 0x540a, 0x3) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='m|mory.event.\x00', 0x26e1, 0x0) 21:04:23 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x10000000, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:23 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x8035000000000000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:23 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0xc45c80eb}, 0x0) 21:04:23 executing program 0: r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x3, 0x2) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f0000000080)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}) r1 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x4) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0505350, &(0x7f0000000200)={{0x9}}) fsetxattr$trusted_overlay_nlink(r2, &(0x7f00000000c0)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U+', 0x7}, 0x28, 0x3) 21:04:23 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x110e0000, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:23 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:24 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x8100000000000000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:24 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$CAPI_GET_FLAGS(r0, 0x80044323, &(0x7f00000000c0)) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@commit={'commit'}}]}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000140)={{{@in=@empty, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@initdev}}, &(0x7f0000000240)=0xe8) ioctl$DRM_IOCTL_GET_CLIENT(r0, 0xc0286405, &(0x7f0000000280)={0x100000001, 0x6, r1, 0x0, r2, 0x0, 0x6, 0x1}) 21:04:24 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1f000000, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:24 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fsetxattr$security_ima(r0, &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=ANY=[@ANYBLOB], 0x1, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0xd1595b881803f0e) socket$bt_rfcomm(0x1f, 0x3, 0x3) 21:04:24 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x86ddffff00000000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:24 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f00000001c0)={0x5, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {{0x2, 0x4e22, @loopback}}}, 0x108) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:24 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0xd0010100}, 0x0) 21:04:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = shmget$private(0x0, 0x400000, 0x8, &(0x7f0000bfe000/0x400000)=nil) getresuid(&(0x7f0000000140), &(0x7f0000000180)=0x0, &(0x7f0000000200)) getgroups(0x1, &(0x7f0000000280)=[0xee01]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in6=@ipv4={[], [], @empty}, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f00000002c0)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) fcntl$getownex(r1, 0x10, &(0x7f0000000580)={0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000005c0)='\x00', 0xffffffffffffffff}, 0x30) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000640)={{0x7, r3, r4, r5, r6, 0x20, 0x800}, 0x8, 0x44524f73, 0x3, 0xd03, r7, r8, 0x66}) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f00000003c0)="840500008832688200521645815c8a4d2f3b40974a9f98f98d31aad4e0a87a3a1251c76aa0f5dda31fb34c1893b1ccd49dfdeb4cde4b428f205754c2eb8a623ba837924b18b88b403915a82451fcab20006512ff76c9f7804ec10a2bb953a4116d912a9d13324e82cdf62ae4f6079bfa225c2a93ada8bf9745756314771307", 0x7f}], 0x2}, 0x0) r9 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r9, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") recvmmsg(r1, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000740)=""/90, 0x2f0}], 0x1, 0x0, 0x353}}], 0x2f2, 0x0, 0x0) 21:04:24 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x20000000, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:24 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x8847000000000000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:24 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x22000000, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:24 executing program 3: socketpair(0xa, 0x3, 0x400, &(0x7f0000000300)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x40, 0x0) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180)=r5, 0x208) ioctl$VIDIOC_S_PARM(r5, 0xc0cc5616, &(0x7f00000001c0)={0x8, @output={0x1000, 0x1, {0x1ff, 0x10001}, 0x7ff, 0x9}}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000140)={0x4, 0x8, 0xfa00, {r6, 0x5}}, 0x10) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:24 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0xeb805cc4}, 0x0) [ 567.986888] audit: type=1804 audit(1566939864.642:287): pid=31722 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir445742101/syzkaller.kbZj8J/429/bus" dev="sda1" ino=17809 res=1 21:04:24 executing program 1: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x8001, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000000c0)={0x0, 0x5}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000140)={r1, @in6={{0xa, 0x4e20, 0x6, @mcast1, 0xffffffffffff8000}}}, &(0x7f0000000240)=0x84) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmmsg$inet_sctp(r0, &(0x7f0000000700)=[{&(0x7f0000000040)=@in={0x2, 0x4e20, @empty}, 0x10, &(0x7f0000000500)=[{&(0x7f0000000080)="a2d05dacf36afa", 0x7}, {&(0x7f0000000280)="96bad37aa3211e2f67fb020068af81824cafb5b9d3317f1fd9992c66bebe60671d365b96dd37d2d1919bbf9db750a5032bf4455ab55b026194db4a145dc2b60d2f160fd66b5728c1361c406fa0c111043d9c0f04d34b2a2de65f7be1d5d28a8a071ac2ffd8f21a031c144d1b4271285505e9f8383b55341fba8e59422cd07b186d8500112b03ffbbc2b50edd05fbc2e42e1f75886051417a2ba0cb65df908a7774da100522072d8201e140a3d004d897e478a065125466f58b71fbdb8bae88cd1b9f227d74135538485afc616fa65376dcc4d4f9bbaa30947e6534bb59", 0xdd}, {&(0x7f0000000380)="5f4608fe17b58a3589561db34c0a5325d1cb92b9fcca9d6b6718b9be93e37a2431f2d0cb53a34c0920008e85d6ab9d699a01a2bac64dddafa6ef40ff68cc4710dda226f1318802d663b921becbc65662fdbb5b40dee9e1aef9d1cf69c000ebbf13f3afe7da01d12a281c7d958144b44be1598177028730caa7842126b7f37506cfe6fca74bfbff67ba9a5550b8d4ef260b971f53d5057134841c666d112691c57633f0adc2237eb8ad9fe2b5ccb0d4e737b6380e9100d53e1bc5fc573624fae8de1454b75e8a2b833b3f517f5b8709212fefacc9c1386461404773618ffe500be9f033638a1393b5489ee02b83dfd4e025d3c5c9", 0xf4}, {&(0x7f0000000600)="510daabdd37e873176780c7a0a4d1cb59d9d7d5b210d7aba2c684ed7be8bb99c8c1bef00890fa8d24b1e717c552c84e9cf824db7dde96cee12f6a978c8e0df67d463265cb9a8d546ae0abb6eb087f9308225c57613d1483592fb43a861a75f955701c0d8af9565c25467054b338e409507f9a9ed7551100de439105e21ef7dd22fd71b86779f90224b05b4d4259920b697c5aa8589d63976c1b5849fcfd9ca1bd800e600140e183b0c5d672efd8aa8d602cf44b91dbeb72abcbabc8ea608c4841294f8b4407883bd03fd468da466", 0xce}, {&(0x7f00000004c0)="5b5b359c1947293784ed1928", 0xc}], 0x5, 0x0, 0x0, 0x80}], 0x1, 0x9b4950264a50efd1) sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000480)=ANY=[@ANYBLOB="2000f6ec", @ANYRES16=r3, @ANYBLOB="01070000000000000000130000f00c0009000600020000000000"], 0x20}}, 0x0) 21:04:24 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) prctl$PR_SVE_GET_VL(0x33, 0x1f7a4) ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000900)={0x10000, 0x0, 0x0, "835521b143cddf143c6b1d800fa075309409179413a835b8c65d708949f73db16405fd47f2f109b8081d9efe2b2f9bd8f61b673bf9e93a068ee0650c", 0x0, "04bcebdb25f7908c119c5a69047f06fd9b86341703976ef17f213c558601b720ee6ec75f35256ffd387fa0715175b27637f97caef0c83f13c425c24f", 0x20}) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x87, &(0x7f0000000100), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/24, @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB='\x00'/156], @ANYBLOB="0503080000000000", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/44], @ANYBLOB=',\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/67], @ANYBLOB='C\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB='\x00'/198], @ANYBLOB="c600000000000000", @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB='\x00'/15], @ANYBLOB="0f00000000000000", @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB='\x00'/54], @ANYBLOB="ffff67a504000000", @ANYPTR=&(0x7f0000000380)=ANY=[@ANYBLOB='\x00'/42], @ANYBLOB='*\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB='\x00'/77], @ANYBLOB='M\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000440)=ANY=[@ANYBLOB='\x00'/244], @ANYBLOB="f400000000000000", @ANYPTR=&(0x7f0000000540)=ANY=[@ANYBLOB='\x00'/219], @ANYBLOB="db00000000000000"], @ANYBLOB='\a\x00'/24], 0x48}, 0x0) 21:04:24 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2c000000, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) [ 568.135202] audit: type=1804 audit(1566939864.652:288): pid=31726 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir445742101/syzkaller.kbZj8J/429/bus" dev="sda1" ino=17809 res=1 21:04:24 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) r6 = dup(r2) write$selinux_context(r6, &(0x7f0000000080)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b) sendmsg$tipc(r5, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:24 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x8848000000000000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:24 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) accept4$x25(0xffffffffffffffff, &(0x7f0000000040)={0x9, @remote}, &(0x7f0000000080)=0x12, 0x80000) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x248903, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x2, 0x1, 0xb1, 0x20, 0xffffffffffffffff, 0x2, [], 0x0, 0xffffffffffffffff, 0x4, 0x5}, 0x3c) r0 = socket$tipc(0x1e, 0x2, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x80000) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000000)={0x5, 0x6}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) 21:04:24 executing program 1: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x4, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000340)={&(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x278}, 0x1, 0x0, 0x0, 0x4000}, 0x81) ioctl$VIDIOC_ENUMAUDIO(r0, 0xc0345641, &(0x7f0000000040)={0x101, "fcfef8416626e5f0cce5b790071c88c3cf406b5f95ed94db5c8e96e13e69e23b", 0x2, 0x1}) r1 = socket$nl_generic(0x10, 0x3, 0x10) shutdown(r1, 0x0) 21:04:25 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0xffffff7f}, 0x0) 21:04:25 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x3f000000, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:25 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) r5 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x101000, 0x0) openat$cgroup_ro(r5, &(0x7f00000000c0)='cpuacct.usage_all\x00', 0x0, 0x0) [ 568.424122] audit: type=1400 audit(1566939865.092:289): avc: denied { shutdown } for pid=31762 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 21:04:25 executing program 1: r0 = syz_open_dev$cec(&(0x7f00000001c0)='/dev/cec#\x00', 0x1, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={r0, &(0x7f0000000040)="776f5ab4dff48ea94bd0be6c12fd7927796d6e16222ce33e3bc431047fb3d21763a345d1a12c8133719ec3791d67d8eafbff1b326334166f32b61d3efbb078311c540a202dcdf237a96a9146308f1baf7c30f0735058d4c32b032e", &(0x7f0000000bc0)=""/4096}, 0x18) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000580)={0x0, 0xa2a5, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="5000000010000507000000060000000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="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"], 0x200}}, 0x0) 21:04:25 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x8864000000000000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:25 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x40000000, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:25 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x4000000000000}, 0x0) 21:04:25 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'L-', 0x1fe}, 0x28, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) [ 568.600756] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.1'. 21:04:25 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x48000000, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:25 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x88a8ffff00000000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 568.675617] IPv6: ADDRCONF(NETDEV_UP): veth3: link is not ready [ 568.704300] team0: Port device veth3 added 21:04:25 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffeee) r2 = epoll_create(0xe) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000000c0)) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000180)=[0x5a, 0x7]) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000100)) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) 21:04:25 executing program 1: r0 = socket(0x2, 0x3, 0x100000001) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) fcntl$setpipe(r0, 0x407, 0x5) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="31370fc8c34e165d35e8f0893ccf36c609715e56213b7b16872f08261e25597acf362a7da9ab0fb743bc4dcd2f2cc4054d7e23cc301aac6a1704390ca745080f741a8e6a355c17566536762ce829d25f28c56a923430b6aaeb50b48de7527cde5687c44ab5431853c5dc81d5bb61b9c87862b469383ae627b5f2c11c12be977e72fed7e438aac43250ad2b0f6330baaf14abc694b25d42f05494e02cbf68") connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="7f454c4620f2c89ee9cb137b0000002f000000003800000000000000000000000000200000000000000000779c00000000000000000000000000000000ad00000400000000252e80a9571596c2000000"], 0x58) 21:04:25 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x100000000000000}, 0x0) 21:04:25 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x4c000000, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:25 executing program 3: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x200000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000000c0)={'icmp6\x00'}, &(0x7f0000000100)=0x1e) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x0, 0xfb, 0xfffffffffffffffd, 0x1, r0, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x5df) sendmsg$tipc(r5, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0xffffffffffffff9a}, 0x40000) 21:04:25 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x88caffff00000000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:25 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x60000000, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:25 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x102, 0x0) connect$rds(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='net/tcp\x00') preadv(r1, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/164, 0xa4}, {&(0x7f0000000180)=""/140, 0x8c}], 0x2, 0x0) 21:04:25 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x300000000000000}, 0x0) 21:04:25 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) getpeername$packet(r0, &(0x7f00000033c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000003400)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000003440)={@local, 0x47, r2}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) r4 = add_key(&(0x7f00000004c0)='dns_resolver\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)="a347bfccc058f64bb2fa91fea8b4a1d642681093c934d90c184f0754e64113d08a491bff272904673c8f77c74c2d6e509536c8d97cd227cb95451fedcb06e6b587c188b44f5a3ca9e6982505762b106c65f0819dd73484a9530082373d0a2be196fa4f64d4c600959c638748f38de2448109b042c5dab8cd1b4733f70ddac5bdeb62a78ec131cb0657a1e838102d3bdc424308ca95dd4f900503804f7b8b632898ef24c25fa28cfe400f5dc7e57d8ea733f6190cdd55701517bfee3e998f7cf542d94be5c6760f649d1de041898b210accc5bbba62", 0xd5, 0xfffffffffffffffe) keyctl$set_timeout(0xf, r4, 0xca9) r5 = syz_open_dev$admmidi(&(0x7f0000000300)='/dev/admmidi#\x00', 0x5, 0x501001) ioctl$EVIOCGID(r5, 0x80084502, &(0x7f0000000380)=""/153) ioctl$EVIOCGRAB(r5, 0x40044590, &(0x7f0000000480)) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) ioctl$EVIOCGBITSW(r5, 0x80404525, &(0x7f00000006c0)=""/240) close(r6) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r7, 0x84, 0xf, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e23, @multicast1}}, 0x5d, 0x0, 0x4, 0xfffffffffffffffd, 0x1}, &(0x7f00000001c0)=0x98) write$FUSE_OPEN(r5, &(0x7f0000000680)={0x20, 0x0, 0x1}, 0x20) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r7, 0x84, 0x1f, &(0x7f0000000200)={r8, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xf}}}, 0x14e5ed2f}, &(0x7f00000002c0)=0x90) write$P9_RMKNOD(r5, &(0x7f0000000640)={0x14, 0x13, 0x2, {0x88, 0x1, 0x7}}, 0x14) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x127) ioctl$VHOST_GET_VRING_BASE(r5, 0xc008af12, &(0x7f0000000440)) sendmsg$tipc(r7, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:25 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x8906000000000000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:25 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x68000000, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) [ 569.192353] net_ratelimit: 16 callbacks suppressed [ 569.192361] protocol 88fb is buggy, dev hsr_slave_0 [ 569.202488] protocol 88fb is buggy, dev hsr_slave_1 [ 569.352381] protocol 88fb is buggy, dev hsr_slave_0 [ 569.352417] protocol 88fb is buggy, dev hsr_slave_1 [ 569.358119] protocol 88fb is buggy, dev hsr_slave_1 [ 569.362684] protocol 88fb is buggy, dev hsr_slave_0 [ 569.372964] protocol 88fb is buggy, dev hsr_slave_1 21:04:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687463915e38802a9d8aea872943afd874e2f98b579a7186270146d0e020692ffa8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000400)={[{@data_err_abort='data_err=abort'}]}) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0xa0000, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000440)={0x51c, r1, 0x200, 0x70bd2d, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0xac, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x7fffffff, @dev={0xfe, 0x80, [], 0x21}, 0x306}}, {0x14, 0x2, @in={0x2, 0x4e21, @loopback}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3280000000000000}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfffffffffffffffc}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xf891}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @loopback}}, {0x14, 0x2, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xc}}}}}]}, @TIPC_NLA_BEARER={0x10c, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x800, @loopback, 0x100}}, {0x14, 0x2, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8000}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'tunl0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x10000}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xa017}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}]}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff00000000000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}]}]}, @TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x63}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x40}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x3ff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}]}, @TIPC_NLA_LINK={0x94, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x53}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x56}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffa}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_SOCK={0x3c, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x80000001}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_BEARER={0x160, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @local}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x80, @mcast2, 0x1}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7ff}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x80000001}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x5, @remote, 0x2}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x25}, 0x9}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @remote}}, {0x14, 0x2, @in={0x2, 0x4e22, @multicast1}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @multicast2}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x1200000000000000, @remote, 0x10000}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}, @TIPC_NLA_MON={0x54, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3ff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x101}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xd5}]}, @TIPC_NLA_NODE={0x38, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5040e7ee}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3f}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000001}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}]}]}, 0x51c}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 21:04:26 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x102, 0x0) connect$rds(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='net/tcp\x00') preadv(r1, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/164, 0xa4}, {&(0x7f0000000180)=""/140, 0x8c}], 0x2, 0x0) 21:04:26 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0xac14140000000000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:26 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x3f00000000000000}, 0x0) 21:04:26 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000100), 0x4) r2 = dup2(r1, r0) ioctl$VIDIOC_G_EDID(r2, 0xc0285628, &(0x7f0000000280)={0x0, 0xffffffffffff8000, 0x0, [], &(0x7f00000000c0)=0x10000}) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x800002, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x101000, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x10, 0x2, 0x0) sendto(r6, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r6, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x11, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0xe88}, {&(0x7f00000000c0)=""/85, 0x2f}, {&(0x7f0000000780)=""/4096, 0x1004}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000140)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x400000000000334, 0x6, &(0x7f0000003700)={0x77359400}) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r5, 0xc0845657, &(0x7f00000001c0)={0x0, @reserved}) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:26 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x6b6b6b00, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:26 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x66da421500000000}, 0x0) 21:04:26 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x6c000000, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:26 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0xe803000000000000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:26 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x102, 0x0) connect$rds(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='net/tcp\x00') preadv(r1, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/164, 0xa4}, {&(0x7f0000000180)=""/140, 0x8c}], 0x2, 0x0) 21:04:26 executing program 0: r0 = socket(0x10, 0x4000000000000002, 0xc) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f00000001c0)={r0, 0x0, 0x7f, 0xfffffffffffffc01, 0x7}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) ioctl$DRM_IOCTL_INFO_BUFS(r1, 0xc0106418, &(0x7f0000000180)={0x7, 0x7, 0x8, 0x7f, 0x10, 0x101}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r1, 0xc4c85512, &(0x7f0000000280)={{0x2, 0x3, 0x1, 0x1, 'syz0\x00', 0x120ad2b8}, 0x0, [0xf9e, 0x7ff, 0x5d7e, 0x8, 0x1, 0x9787, 0xe259, 0x6, 0x10000, 0x9, 0x2000000000000, 0x1, 0x1, 0x101, 0x40, 0x5, 0x9, 0x114, 0x9cc, 0x8009, 0x9, 0x1, 0x0, 0x4, 0x4, 0x7, 0x0, 0x8, 0x2, 0x200, 0x9, 0x3, 0x2, 0xff, 0x1, 0x1, 0x101, 0x3, 0x8, 0x4, 0xdf, 0x1567, 0x3, 0x4, 0xfaf, 0x1, 0x401, 0x7, 0x0, 0x6f, 0x3, 0x5, 0xff, 0x1, 0x8ca, 0x8ef, 0x81, 0x1f, 0x101, 0x100000000000, 0x4, 0x7, 0x200, 0xe37, 0xd3e, 0x5, 0x1e0e, 0x2, 0x7, 0x7, 0xb4, 0x1, 0x6, 0x3, 0x2, 0xff, 0x4, 0x6, 0xfff, 0xb91, 0x4, 0x8001, 0x6e1, 0x8, 0x0, 0x0, 0x2, 0xa3, 0x6, 0xcb, 0x1b, 0x380, 0xfffffffffffffff8, 0x4, 0x61122269, 0x5, 0x3, 0xffffffff, 0x80, 0xed4, 0x1, 0xfff, 0xa7, 0x4, 0xc0, 0xe0f8, 0x5, 0x7ff, 0x2, 0x3f, 0x9, 0x1, 0xd0f1, 0x40, 0xd7a, 0xfffffffffffffffb, 0x6, 0xfffffffffffffffd, 0x8, 0x5, 0x800, 0x80000000, 0xc0, 0x9, 0x1ff, 0xfffffffffffffffb, 0x401], {0x0, 0x989680}}) write(r0, &(0x7f0000000240)="1f0000001000fffffd3b543407110000f34400030b000400038cb188819f02", 0x1f) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000100)={'HL\x00'}, &(0x7f0000000140)=0x1e) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x2, 0xc000) r3 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$SIOCGSTAMP(r3, 0x8906, &(0x7f00000000c0)) ioctl$DRM_IOCTL_RM_MAP(r2, 0x4028641b, &(0x7f0000000040)={&(0x7f0000ffd000/0x3000)=nil, 0x1, 0x1, 0x2, &(0x7f0000ffc000/0x1000)=nil, 0x6a}) syz_init_net_socket$ax25(0x3, 0x3, 0x90963040d92c8212) ioctl$DRM_IOCTL_SET_MASTER(r2, 0x641e) 21:04:26 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0xc45c80eb00000000}, 0x0) 21:04:26 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x74000000, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:27 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0xfdffffff00000000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 570.312346] protocol 88fb is buggy, dev hsr_slave_0 [ 570.312351] protocol 88fb is buggy, dev hsr_slave_0 [ 570.312392] protocol 88fb is buggy, dev hsr_slave_1 21:04:27 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x102, 0x0) connect$rds(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='net/tcp\x00') preadv(r1, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/164, 0xa4}, {&(0x7f0000000180)=""/140, 0x8c}], 0x2, 0x0) 21:04:27 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0xfeffffff00000000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:27 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) pipe2$9p(&(0x7f0000000280)={0xffffffffffffffff}, 0x80000) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) r8 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm-control\x00', 0x82, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(r8, 0xc0206416, &(0x7f0000000780)={0x73, 0x800, 0x101, 0x1, 0x10, 0x1}) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000480)={{{@in, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000580)=0xe8) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x20000, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_user='access=user'}, {@noextend='noextend'}, {@version_u='version=9p2000.u'}, {@access_uid={'access', 0x3d, r7}}, {@nodevmap='nodevmap'}, {@cache_fscache='cache=fscache'}, {@noextend='noextend'}], [{@uid_lt={'uid<', r9}}, {@smackfshat={'smackfshat', 0x3d, '-\x00'}}, {@uid_lt={'uid<', r10}}, {@smackfsdef={'smackfsdef', 0x3d, '-\x00'}}, {@obj_user={'obj_user', 0x3d, '-\x00'}}]}}) close(r4) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f00000007c0)) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) r11 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000006c0)='/selinux/status\x00', 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r11, 0x227b, &(0x7f0000000700)=0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000080)='-\x00'}, 0x30) capset(&(0x7f0000000100)={0x19980330, r12}, &(0x7f00000001c0)={0x80, 0x7, 0x4a5928a8, 0x0, 0x7fffffff, 0x100000000}) sendmsg$tipc(r5, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:27 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0xd001010000000000}, 0x0) 21:04:27 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0a85322, &(0x7f0000000040)={{0x6a}}) write$binfmt_elf64(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x227) get_mempolicy(&(0x7f0000000180), &(0x7f00000001c0), 0x6, &(0x7f0000ffa000/0x4000)=nil, 0x789a690763ffd467) prctl$PR_GET_SECCOMP(0x15) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x10000, 0x0) ioctl$EVIOCGVERSION(r1, 0x80044501, &(0x7f00000000c0)=""/140) 21:04:27 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x7a000000, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:27 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x102, 0x0) connect$rds(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/164, 0xa4}, {&(0x7f0000000180)=""/140, 0x8c}], 0x2, 0x0) 21:04:27 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0xfffffffffffff000, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:27 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:27 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) ppoll(&(0x7f0000000000)=[{r0, 0x4206}, {r0, 0x1000}, {r0, 0x4000}, {r0, 0x60}, {r0, 0x100}, {r0, 0x8000}, {r0, 0x200}], 0x7, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180)={0x4}, 0x8) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000080)=[{{0x0, 0x8100, 0x0}}], 0x210, 0x2, 0x0) 21:04:27 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0xffffff7f00000000}, 0x0) 21:04:27 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x102, 0x0) connect$rds(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/164, 0xa4}, {&(0x7f0000000180)=""/140, 0x8c}], 0x2, 0x0) 21:04:27 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0xfffffffffffffe31) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) r4 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept4$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14, 0x800) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000200)={{{@in=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000000300)=0xe8) getsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f0000000380)={@loopback, 0x0}, &(0x7f00000003c0)=0x14) recvmsg(r0, &(0x7f00000005c0)={&(0x7f0000000440)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/173, 0xad}], 0x1}, 0x20) getsockname$packet(r0, &(0x7f0000000740)={0x11, 0x0, 0x0}, &(0x7f0000000780)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000900)={{{@in=@multicast2, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f0000000a00)=0xe8) getsockname$packet(r1, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a80)=0x14) getsockname$packet(r0, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000b00)=0x14) getsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000b40)={@ipv4={[], [], @local}, 0x0}, &(0x7f0000000b80)=0x14) accept4$packet(r0, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000c00)=0x14, 0x80000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000c40)={{{@in6=@mcast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000d40)=0xe8) getpeername(r0, &(0x7f0000000f40)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000fc0)=0x80) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000001100)={0x0, @broadcast, @broadcast}, &(0x7f0000001140)=0xc) accept(r1, &(0x7f0000001180)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000001200)=0x80) recvmsg(r3, &(0x7f0000001500)={&(0x7f0000001240)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000013c0)=[{&(0x7f00000012c0)=""/229, 0xe5}], 0x1, &(0x7f0000001400)=""/213, 0xd5}, 0x2000) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001740)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000001840)=0xe8) getsockname$packet(r1, &(0x7f0000001880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000018c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000019c0)={{{@in=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000001ac0)=0xe8) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001b00)={0x0, @dev, @loopback}, &(0x7f0000001b40)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001b80)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000001c80)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001cc0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000001dc0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000001e00)={'team0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001e40)={{{@in=@initdev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000001f40)=0xe8) accept4$packet(r1, &(0x7f0000001f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001fc0)=0x14, 0x80800) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000002040)={@local, @empty, 0x0}, &(0x7f0000002080)=0xc) getsockname$packet(r0, &(0x7f00000020c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002100)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000002140)={{{@in6, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}}}, &(0x7f0000002240)=0xe8) getsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f00000047c0)={@rand_addr, 0x0}, &(0x7f0000004800)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000005200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1400}, 0xc, &(0x7f00000051c0)={&(0x7f0000004840)={0x968, r4, 0x0, 0x70bd2b, 0x25dfdbfc, {}, [{{0x8, 0x1, r5}, {0x130, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0xfb}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r8}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r9}, {0xf8, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r10}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0x4f, 0x4, 0x100000000}, {0x6, 0x7, 0x100, 0x200000000}, {0x0, 0xc44, 0x37a, 0x8000}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x100000000}}}]}}, {{0x8, 0x1, r11}, {0xb4, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xe2}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1f}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r13}}}]}}, {{0x8, 0x1, r14}, {0x44, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r15}, {0x230, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r16}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x100000}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x60}}, {0x8, 0x6, r17}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r19}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r20}}, {0x8}}}]}}, {{0x8, 0x1, r21}, {0x15c, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xc5}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r22}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffff25}}, {0x8, 0x6, r23}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7b9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r24}}}]}}, {{0x8, 0x1, r25}, {0x1e8, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r26}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r27}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r28}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r29}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r30}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x6766}}, {0x8, 0x6, r31}}}]}}, {{0x8, 0x1, r32}, {0x80, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r33}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1000000000}}, {0x8}}}]}}]}, 0x968}, 0x1, 0x0, 0x0, 0x40004}, 0x4000840) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r34) setsockopt$sock_attach_bpf(r35, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r34, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x76, 0x0, 0x186}, 0x0) 21:04:27 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x4, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:27 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x3}, 0x0) 21:04:27 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x102, 0x0) connect$rds(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/164, 0xa4}, {&(0x7f0000000180)=""/140, 0x8c}], 0x2, 0x0) 21:04:27 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x97ffffff, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:27 executing program 0: socket$nl_xfrm(0xa, 0x3, 0x87) sigaltstack(&(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000000)) syz_emit_ethernet(0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffeaff86dd60d8652b0014f100fe8000000000000000000000000000aafe8000004100000000000000000000aaf4020000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYRES64], 0x0) 21:04:27 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:27 executing program 1: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x102, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/tcp\x00') preadv(r0, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/164, 0xa4}, {&(0x7f0000000180)=""/140, 0x8c}], 0x2, 0x0) 21:04:27 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x4}, 0x0) 21:04:27 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x29, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:27 executing program 0: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$usbmon(0xffffffffffffff9c, &(0x7f0000000080)='/dev/usbmon0\x00', 0x101000, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x3f, &(0x7f00000000c0), 0x0) syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x7, 0xc0080) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)="2e00000036008182e45ae087185082cf0324b0eba06ef9075b3f00169148790700d90080e2300000000020000000", 0x2e}], 0x1}, 0x0) 21:04:27 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0xc0ed0000, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) [ 571.300806] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.0'. [ 571.352385] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.0'. 21:04:28 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x300}, 0x0) 21:04:28 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/tcp\x00') preadv(r0, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/164, 0xa4}, {&(0x7f0000000180)=""/140, 0x8c}], 0x2, 0x0) 21:04:28 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0xd2030000, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:28 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2b, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:28 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$int_out(r1, 0x5462, &(0x7f0000000080)) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f00000001c0)=0x0) ptrace$getenv(0x4201, r3, 0x5, &(0x7f0000000200)) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r4) r6 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$TUNGETIFF(r6, 0x800454d2, &(0x7f0000000100)) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4) sendmsg$tipc(r5, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:28 executing program 0: openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x7, 0x101000) ioctl$PPPIOCGFLAGS1(r0, 0x8004745a, &(0x7f0000000080)) 21:04:28 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x3f00}, 0x0) 21:04:28 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2c, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:28 executing program 1: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/164, 0xa4}, {&(0x7f0000000180)=""/140, 0x8c}], 0x2, 0x0) 21:04:28 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:28 executing program 0: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f0000000000)) ftruncate(r0, 0x800000200008200) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r1, 0x0) mlock2(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x1) mlock(&(0x7f0000002000/0x3000)=nil, 0x3000) ioctl$NBD_SET_SIZE(r0, 0xab02, 0xffffffffffff8000) 21:04:28 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) fsetxattr$trusted_overlay_upper(r4, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000380)={0x0, 0xfb, 0x1015, 0x4, 0x100, "4090b313295717498acfbfaf18555cac", "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"}, 0x1015, 0x3) 21:04:28 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x3c, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:28 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x101d0}, 0x0) 21:04:28 executing program 1: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/164, 0xa4}, {&(0x7f0000000180)=""/140, 0x8c}], 0x2, 0x0) 21:04:28 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0xfcfdffff, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:28 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f00000000c0)={{}, {}, 0xfffffffffffffff9, 0x0, 0x4}) ioctl(r0, 0xffffffffffffffb0, &(0x7f0000000040)) 21:04:28 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xffffff89, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:28 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r3, 0xc, 0x5ce0db034874e366, 0x10001, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:29 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x40000}, 0x0) 21:04:29 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0xfdfdffff, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) inotify_init() ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x48, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="4400000010000100"/20, @ANYRES32=r1, @ANYBLOB="0100000000000003240012001400d5fa623269646765cdb16fca76653c5706000c000500080019000500f857e5eae4f99cb536058176642e3237603dbbfc0300000000000000978619899f048dc9769f72bfbcf1aa73ea962c45ef4c5990dcb2964387e46e639dee05772edefd470037488b4edd53745a0abe43871b5178d5deca6941d591dd2d957f3c7ea6cb38423b404fd43fb09893bbb557974d6a160560ced36a82d21bae31d130de16264b4429cf1bb2fad36c415dc7de7591d1d89036f7"], 0x44}}, 0x0) 21:04:29 executing program 1: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/164, 0xa4}, {&(0x7f0000000180)=""/140, 0x8c}], 0x2, 0x0) 21:04:29 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x13}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:29 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0xfdffffff, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) [ 572.501600] netlink: 'syz-executor.0': attribute type 25 has an invalid length. 21:04:29 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x1000000}, 0x0) 21:04:29 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x2, 0x3, 0x3, &(0x7f00000002c0)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x2, 0x6, 0xfffffffffffffff8, 0x9, 0x1}, &(0x7f00000001c0)=0x98) syz_open_dev$ndb(&(0x7f0000000300)='/dev/nbd#\x00', 0x0, 0x400401) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000200)=@assoc_value={r5, 0x80}, 0x30a) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/cache_stats\x00', 0x0, 0x0) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r4, 0x11b, 0x6, &(0x7f0000000240)=0x8000, 0x4) 21:04:29 executing program 1: syz_open_procfs(0x0, &(0x7f0000000300)='net/tcp\x00') preadv(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/164, 0xa4}, {&(0x7f0000000180)=""/140, 0x8c}], 0x2, 0x0) 21:04:29 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:29 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000080)={0x18, 0x1, 0x0, {0x8}}, 0x18) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000000c0)={0x8001}) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000140)={0x0, 0xa7, "26809d08bdb12f6e75ca92ece4cbda03281f2142d7677033c9bf2e7e9586154472ec6771cb86246acbb48ffc9a3f514d5d1d384668856e84317b0523ab4882038eb9dd892122fd501a88c778731bba591b51f3b7b18531a7b18ce37368d61380e695e930bdf717a29efcdb095fec15505f70019e5ea382e79c328a0c3c11c65ac63e7d879665685ef9a3cdef6d6c80f4c7aa95ae39843bf01bbe29f71623774e610e3090004d66"}, &(0x7f0000000200)=0xaf) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000240)={r2, 0x7fffffff}, &(0x7f0000000280)=0x8) setsockopt$RDS_RECVERR(r1, 0x114, 0x5, &(0x7f0000000100), 0x4) 21:04:29 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0xfeffffff, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:29 executing program 3: socketpair(0x1e, 0x4, 0x0, &(0x7f0000000380)={0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@empty}}, &(0x7f00000000c0)=0xe8) sendto$packet(r0, &(0x7f0000000080)="ceafdfbc7522e9f6b302befb565aa8b4574c958664164f6529d9d9c22e10cc14a12d338e19e7188fd744360fb0d2bd146faa66d0a5ba88e0d051a26d", 0x3c, 0x40, &(0x7f0000000100)={0x11, 0xf86b1aef7bde6054, r2, 0x1, 0x15, 0x6, @broadcast}, 0x14) close(r1) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0xfffffffffffffc9e) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) openat$urandom(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x8000, 0x0) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r4, 0x0, 0x48f, &(0x7f0000000140)={0x88, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e24, 0x4, 'fo\x00', 0x4, 0x2, 0x2f}, 0x2c) 21:04:29 executing program 1: syz_open_procfs(0x0, &(0x7f0000000300)='net/tcp\x00') preadv(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/164, 0xa4}, {&(0x7f0000000180)=""/140, 0x8c}], 0x2, 0x0) 21:04:29 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x3000000}, 0x0) 21:04:29 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x18}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:29 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0xffff1f00, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:29 executing program 0: pipe(&(0x7f0000000400)={0xffffffffffffffff}) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000440)={0x80000001, 0x19, 0xfe92, 0xb3, "e4d32785ab42eca054056095de2d94a799685459e4ee67189e7c9c9d24fb804c"}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x60000, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300)={0x0, 0x2}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000380)={0x0, 0x1, 0x8000, 0x80, 0x4, 0x1f, 0x6, 0x2, r2}, &(0x7f00000003c0)=0x20) r3 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0xfffffffffffffff9, 0x2000) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r3, 0xc05c5340, &(0x7f0000000200)={0x5, 0x4, 0x7, {r4, r5+10000000}, 0x1, 0x4}) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000100)=0x0) fcntl$setownex(r3, 0xf, &(0x7f0000000280)={0x2, r6}) r7 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r8 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r9 = dup2(r8, r7) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r9, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) write$sndseq(r7, &(0x7f0000000000)=[{0xee13, 0x1e, 0x1, 0xffffffffffffffff, @tick, {}, {0x2000000000000}, @connect}], 0x30) 21:04:29 executing program 1: syz_open_procfs(0x0, &(0x7f0000000300)='net/tcp\x00') preadv(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/164, 0xa4}, {&(0x7f0000000180)=""/140, 0x8c}], 0x2, 0x0) 21:04:29 executing program 3: close(0xffffffffffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x511000, 0x0) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f00000001c0)={0x5, 0x6, 0x3}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0xfffffffffffffffa, &(0x7f0000000340)={0x0, 0x0}) close(r2) r4 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x7d63, 0x80) ioctl$KDGKBLED(r4, 0x4b64, &(0x7f00000000c0)) ioctl$GIO_UNISCRNMAP(r4, 0x4b69, &(0x7f0000000280)=""/184) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r3, &(0x7f0000000240)={&(0x7f0000000040)=@name={0x1e, 0x2, 0x3, {{0x41, 0x3}}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0) 21:04:29 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x1542da66}, 0x0) 21:04:29 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x26}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:29 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0xfffffdfc, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:29 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000080000140100000400"/72], 0x48}, 0x0) 21:04:29 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/tcp\x00') preadv(r0, 0x0, 0x0, 0x0) 21:04:29 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0xfffffdfd, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:29 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x3f000000}, 0x0) 21:04:29 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e20, 0x0, @empty, 0x6}}, 0x1ff, 0x8, 0x80000000, 0x0, 0x4}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000280)={r5, 0x8}, &(0x7f00000002c0)=0x8) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:29 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28, 0x3}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:30 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1003f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x0, &(0x7f0000000000)=0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x101000, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm_plock\x00', 0x0, 0x0) io_submit(r1, 0x3, &(0x7f0000000500)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0xea, r0, &(0x7f00000001c0)="3f85801757f11bf611b41eb43a09ceaf1d8ce16f6196bc324f9093ce95602a240279ab396b646feae68ad2315084f63164799d1587b49245a7bb11dd9f5cfd5b5ba9496d30f0c70e811c774e61246efc85df0c3e8d202c9ffb882a18df51bc1727a8f02289ca7aad511be8993f43edaf2a54fa7f8feec8b8eced83f2273d22afbe4099e50c9a00a6e22c5ac19c233efa914466a05671ed082048c2cca2564cde4929ffbc477010de3ae0945cd4f5f75616d4c2b0caace559", 0xb8, 0x5, 0x0, 0x1, r0}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x6, r0, &(0x7f0000000280)="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", 0xfb, 0x5c, 0x0, 0x2, r2}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x3, 0x6, r0, &(0x7f00000003c0)="8a5b0fbf0145941b5399b6ca8b58e8a307cc1ebefa63d33214d5a0b2df82f30bac60fb77115de7c22bc58e2755a3e12160461ea55f9b2fb98faad24f689594d64a8e30ebd8663ef7cd67e8265da2d4e63c4599814811cf2a5034109af12e4c645cd16626c6987ac900f52ce3308315d9c5878e0cace00aefb2b2a1a4625abdd87b2f003bc7998c", 0x87, 0x3f, 0x0, 0x0, r3}]) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r4, r0) 21:04:30 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/tcp\x00') preadv(r0, 0x0, 0x0, 0x0) 21:04:30 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0xffffff7f, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:30 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x5, 0xa, 0x6, &(0x7f0000000080)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x400000, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r5, 0x40044900, 0x7f) writev(r1, &(0x7f0000000300)=[{&(0x7f00000001c0)="f0781b2c37c62951d2ea198b27a580160a151afba75fb0d9c56b75940dc23cd2e18d55d898d83ad9e73ad8cfe0fd2ded0ce35b05312d3edaa4c3edb9c6173afc7f1d77c4479d75e065b8fd5532d4c5666a1c2b1213c7cd94", 0x58}, {&(0x7f0000000240)="a1f86f281c1725179e5a60edcd95d1f29ad0ca80fcda38dbbcbaf1abe4476ae119dd4bc6ed61a51d477e01a856ede4aa1abe917d0e93b84df636b14c6e7ae4b3133e4f8f2edd1f942c894464d3d226596e97b2a62937ddf4cbd5a0f563d8972b9c8634727954b9c1d67784160d11bc0c643b6bac5674d32caea9787c13591ea08279", 0x82}, {&(0x7f0000000100)="c79984980681ba011cc30f5f171d949f3568e2caa6e9b8507771", 0x1a}], 0x3) 21:04:30 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x66da4215}, 0x0) 21:04:30 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x200, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x101000, 0x0) syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x8000, 0x14800) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x200, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x80040, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x800) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000100)={0x4, 0xea, "fca8639cac67be6e13a53ba420082fae277c798da9b68bf33a8c27e31091850bf3328925213aa664909e65208c23611a6a11e3b53d3fde88084e5e524317715a33a5c93ce077aeab3be50114963e9481e815627a41a86703bca89e1cdd4bd647504ecf81b1891857301124cefce7f68ac083afff77ca7ce96be0bc08654dd41330f1f544137cd79cac1bc2fb32eb7f3f5776ef3a3ffa4229153176b02e1ec756094c459e6a4d0f94df5276c937c0343161b156746cc95fc7cc916ea9e73fe1a95e180785db28a0d86c34bde0c3491c3a1cb77b089e86f8c222c7f41723de1fb6ed9cb96d436d68604e6c"}) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_GET_MANUFACTURER(r1, 0xc0104320, &(0x7f00000000c0)=0xfffffffffffffffe) 21:04:30 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/tcp\x00') preadv(r0, 0x0, 0x0, 0x0) 21:04:30 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28, 0x4}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:30 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:30 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28, 0xb}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:30 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) fsetxattr$trusted_overlay_origin(r1, &(0x7f0000000280)='trusted.overlay.origin\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x3) sysinfo(&(0x7f0000000380)=""/166) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r3, 0xf19412a7f7f236cf, 0x70bd29, 0x25dfdbfc, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x17) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r5, &(0x7f0000000000)={&(0x7f0000000080), 0x2, 0x0, 0x0, 0x0, 0x0, 0x40040}, 0x10002) 21:04:30 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0xc45c80eb}, 0x0) [ 573.672742] kcapi: manufacturer command 4294967294 unknown. 21:04:30 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/tcp\x00') preadv(r0, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/164, 0xa4}], 0x1, 0x0) 21:04:30 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0xffffff97, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:30 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0xd) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000080)) 21:04:30 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) sendmmsg$unix(r0, &(0x7f0000000280), 0x0, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) r5 = fcntl$getown(r0, 0x9) rt_sigqueueinfo(r5, 0x29, &(0x7f0000000400)={0x1a, 0x0, 0x1}) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) epoll_wait(r4, &(0x7f0000000480), 0x0, 0x4) r8 = syz_open_dev$vbi(&(0x7f00000002c0)='/dev/vbi#\x00', 0x3, 0x2) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000001c0)=r8, 0x4) close(r6) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x127) ioctl$TIOCGPGRP(r8, 0x540f, &(0x7f0000000100)=0x0) capget(&(0x7f0000000280)={0x20071026, r9}, &(0x7f0000000300)={0x80, 0x60000000000, 0x2, 0x8000, 0xfe, 0xeb}) sendmsg$tipc(r7, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x40) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$sock_linger(r6, 0x1, 0xd, &(0x7f0000000080), &(0x7f00000000c0)=0x8) ioctl$IMCTRLREQ(r8, 0x80044945, &(0x7f00000003c0)={0x4000, 0x6, 0x6, 0x1}) 21:04:30 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:30 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0xd0010100}, 0x0) 21:04:30 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/tcp\x00') preadv(r0, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/164, 0xa4}], 0x1, 0x0) 21:04:30 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) accept(r0, &(0x7f0000000480)=@can={0x1d, 0x0}, &(0x7f0000000500)=0x80) sendmsg$nl_route_sched(r0, &(0x7f0000000600)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8200004}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)=@getqdisc={0x48, 0x26, 0x1, 0x70bd2c, 0x25dfdbfc, {0x0, r1, {0x18, 0x6}, {0xf, 0xfff3}, {0xe, 0xa}}, [{0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'syz_tun\x00'}) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[]}, 0x1, 0x0, 0x0, 0x10}, 0x0) 21:04:30 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/tcp\x00') preadv(r0, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/164, 0xa4}], 0x1, 0x0) 21:04:30 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0xeb805cc4}, 0x0) 21:04:30 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28, 0x223}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:30 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0xb6f7, 0x5530c2) ioctl$TCGETS(r3, 0x5401, &(0x7f00000000c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r4) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:30 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0xfffffffd, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:30 executing program 0: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0x10) read(r0, &(0x7f0000000180)=""/221, 0xdd) r1 = socket$nl_crypto(0x10, 0x3, 0x15) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x200000, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r2, 0xc06864a1, &(0x7f0000000400)={&(0x7f00000003c0)=[0x1f, 0x7, 0x8, 0x2, 0x9, 0xd5d8, 0x6, 0x800, 0x5b], 0x9, 0x1, 0xffe6, 0x10001, 0x6, 0x5, {0xd5, 0x3f, 0x1, 0x7ff, 0x3, 0x7, 0x4, 0x424, 0x1, 0x3f, 0xe05b, 0x2, 0x1, 0x3, "085cff39051c8ea5534ed3bc82b952957aa9621a58601ce1ad0107ba89a3d567"}}) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x680, 0x0) poll(&(0x7f0000000000)=[{r1, 0x100004000}], 0x1, 0x5) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x800, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000300)={0x0}) ioctl$DRM_IOCTL_GET_CTX(r4, 0xc0086423, &(0x7f0000000340)={r5, 0x1}) fsetxattr$security_smack_transmute(r3, &(0x7f0000000040)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0x4, 0x3) getsockopt$netlink(r3, 0x10e, 0x9, 0x0, &(0x7f0000000280)) 21:04:30 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/tcp\x00') preadv(r0, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/164, 0xa4}, {0x0}], 0x2, 0x0) 21:04:31 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x202, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:31 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev={0xac, 0x3}}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:31 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0xffffff7f}, 0x0) 21:04:31 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0xfffffffe, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:31 executing program 0: r0 = syz_open_dev$admmidi(&(0x7f0000000300)='/dev/admmidi#\x00', 0x3, 0x8000) ioctl$TIOCCONS(r0, 0x541d) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000040)=0x6, 0x4) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$MON_IOCH_MFLUSH(r1, 0x9208, 0x36) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f00000002c0)={r1, 0x0, 0x0, 0x1, 0x6a}) fgetxattr(r2, &(0x7f0000000080)=@known='com.apple.system.Security\x00', 0x0, 0x0) r3 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)="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", 0xfb, 0xfffffffffffffffe) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000340)) keyctl$read(0xb, r3, &(0x7f0000000240)=""/78, 0x4e) 21:04:31 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/tcp\x00') preadv(r0, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/164, 0xa4}, {0x0}], 0x2, 0x0) 21:04:31 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev={0xac, 0x4}}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 574.472364] net_ratelimit: 21 callbacks suppressed [ 574.472372] protocol 88fb is buggy, dev hsr_slave_0 [ 574.472398] protocol 88fb is buggy, dev hsr_slave_1 [ 574.477693] protocol 88fb is buggy, dev hsr_slave_1 21:04:31 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0) 21:04:31 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1000000000, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:31 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/tcp\x00') preadv(r0, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/164, 0xa4}, {0x0}], 0x2, 0x0) 21:04:31 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f00000001c0)=""/146, &(0x7f0000000100)=0x92) socketpair(0x1e, 0x6, 0x80000000, &(0x7f0000000340)={0x0, 0x0}) close(r4) r6 = dup2(r0, r0) ioctl$TCSETS(r6, 0x5402, &(0x7f0000000280)={0x4, 0xffffffffffffffff, 0x1ff, 0x9, 0x15, 0x0, 0xa, 0x7, 0xfffffffffffffff9, 0x1, 0x7, 0x6}) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x20000, 0x0) ioctl$TCSETAF(r7, 0x5408, &(0x7f00000002c0)={0x4000000000000000, 0x7fff, 0x100000001, 0x313, 0x13, 0xfffffffffffffffe, 0x5, 0x7, 0x0, 0x6}) r8 = dup3(r2, r7, 0x80000) ioctl$TIOCGPTLCK(r7, 0x80045439, &(0x7f00000000c0)) ioctl$BLKROGET(r8, 0x125e, &(0x7f0000000300)) sendmsg$tipc(r5, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) ioctl$KVM_GET_API_VERSION(r8, 0xae00, 0x0) 21:04:31 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev={0xac, 0xb}}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000009c0)="11dca50d5e0bcfe47bf070") ppoll(&(0x7f0000000280)=[{}], 0xf, &(0x7f00000002c0)={0x77359400}, 0x0, 0x0) 21:04:31 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0xedc000000000, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:31 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0) 21:04:31 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000080), 0x25) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f00000001c0)='syz0\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r4) pipe2$9p(&(0x7f00000000c0), 0x80000) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r5, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0xffffffffffffffb8}, 0x0) 21:04:31 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x80, 0x0, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000000), 0x800000001fffffd) 21:04:31 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev={0xac, 0x28}}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:31 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/tcp\x00') preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000180)=""/140, 0x8c}], 0x1, 0x0) 21:04:31 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x4000000000000, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:31 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x300000000000000}, 0x0) 21:04:31 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/tcp\x00') preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000180)=""/140, 0x8c}], 0x1, 0x0) 21:04:31 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$adsp(&(0x7f00000016c0)='/dev/adsp#\x00', 0x4, 0x800) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000001540)={{0xa3d9, 0x7f, 0xb519, 0x94fa, 0x5, 0x44a7}, 0x2}) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r5 = dup2(r0, r0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r5, 0xc08c5335, &(0x7f0000001600)={0x10001000000000, 0x2, 0x9, 'queue1\x00', 0x4}) ioctl$VHOST_SET_MEM_TABLE(r5, 0x4008af03, &(0x7f0000001480)={0x5, 0x0, [{0x3000, 0x54, &(0x7f0000000080)=""/84}, {0xa16182d8ddbe95d4, 0x1000, &(0x7f0000000380)=""/4096}, {0xd000, 0xc6, &(0x7f00000001c0)=""/198}, {0x3000, 0x5, &(0x7f0000000100)=""/5}, {0x2000, 0xc2, &(0x7f0000001380)=""/194}]}) ioctl$KVM_HAS_DEVICE_ATTR(r5, 0x4018aee3, &(0x7f00000015c0)={0x0, 0xfffffffffffffdf0, 0x100000001, &(0x7f0000001580)=0x6}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f00000002c0)={@empty, 0xa5a, 0x0, 0xff, 0x4, 0x8001, 0x2b48}, &(0x7f0000000300)=0x20) 21:04:31 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0xe000000000000, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:31 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev={0xac, 0x223}}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:31 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) unlink(&(0x7f0000000080)='./file0\x00') sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="24000000180007041dfffd946f6105000af000001f0004670300080008001400022bd000", 0x24}], 0x1}, 0x0) 21:04:31 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/tcp\x00') preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000180)=""/140, 0x8c}], 0x1, 0x0) 21:04:31 executing program 3: socketpair(0x3, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:31 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x3f00000000000000}, 0x0) 21:04:31 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x6b6b6b00000000, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:31 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev={0xac, 0x14, 0x3}}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 575.291586] netlink: 'syz-executor.0': attribute type 20 has an invalid length. 21:04:32 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/tcp\x00') preadv(r0, &(0x7f0000000240)=[{0x0}, {&(0x7f0000000180)=""/140, 0x8c}], 0x2, 0x0) 21:04:32 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:32 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev={0xac, 0x14, 0x4}}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 575.352582] netlink: 'syz-executor.0': attribute type 20 has an invalid length. 21:04:32 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) setsockopt$llc_int(r4, 0x10c, 0x1, &(0x7f00000000c0)=0xe9, 0x4) ioctl$VIDIOC_G_FMT(r5, 0xc0d05604, &(0x7f00000001c0)={0xb, @raw_data="52a76ea9ac99bed6555a198d3d4dd6dc0afa6e7f6c0deab25742f59ee38c250ca2c6454582cc2f0bbb74e7b91d41d086108be2e1b00936260f10f95f0a1cb6a26f095eef91050a6bc786bea64f51c2215351f127510c740324d3957e171afd98b2ff4fcc52be86506ade17316167652753f8879a11ac0a012e428089aff7355bb80c549383f6e3729297267a38904fcab4ebe5d8a66ebf177fba471f1e0dbdff42de165b4d73a4df467c20f7e6e95267748beb9e6e51650f153f7492b78f3d01488166b47e254700"}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:32 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x66da421500000000}, 0x0) [ 575.432340] protocol 88fb is buggy, dev hsr_slave_0 [ 575.437498] protocol 88fb is buggy, dev hsr_slave_1 21:04:32 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xe, 0x4, 0x4, 0x3}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0, 0x3}, 0x2c) r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7fffffff, 0x545ce85048af5b5e) getpeername(r0, &(0x7f0000000040)=@ethernet={0x0, @random}, &(0x7f00000000c0)=0x80) connect$pppoe(r0, &(0x7f0000000100)={0x18, 0x0, {0x1, @random="391184d350ea", 'team_slave_1\x00'}}, 0x1e) 21:04:32 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev={0xac, 0x14, 0xb}}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:32 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/tcp\x00') preadv(r0, &(0x7f0000000240)=[{0x0}, {&(0x7f0000000180)=""/140, 0x8c}], 0x2, 0x0) 21:04:32 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:32 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x800000000004e23, @multicast1}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/rpc\x00') ioctl$TCSETS2(r1, 0x402c542b, &(0x7f00000000c0)={0xffffffffffffffab, 0x9, 0x7ff, 0x8, 0x3, "dae14eb9fdd6ee96a3004e10a951d456f4196b", 0x10000, 0x3}) setsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000140)='\x00', 0x1) sendto$inet(r0, 0x0, 0x0, 0x20004080, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) getpeername$inet(r0, &(0x7f0000000100)={0x2, 0x0, @empty}, &(0x7f0000000180)=0x10) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000040)={'lapb0\x00', {0x2, 0x4e21, @multicast1}}) [ 575.592365] protocol 88fb is buggy, dev hsr_slave_0 [ 575.592403] protocol 88fb is buggy, dev hsr_slave_1 [ 575.597506] protocol 88fb is buggy, dev hsr_slave_1 [ 575.607599] protocol 88fb is buggy, dev hsr_slave_0 [ 575.612733] protocol 88fb is buggy, dev hsr_slave_1 21:04:32 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/tcp\x00') preadv(r0, &(0x7f0000000240)=[{0x0}, {&(0x7f0000000180)=""/140, 0x8c}], 0x2, 0x0) 21:04:32 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0xc45c80eb00000000}, 0x0) 21:04:32 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev={0xac, 0x14, 0x28}}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:32 executing program 1 (fault-call:1 fault-nth:0): r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/tcp\x00') preadv(r0, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/164, 0xa4}, {&(0x7f0000000180)=""/140, 0x8c}], 0x2, 0x0) 21:04:32 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) fsetxattr$trusted_overlay_nlink(r4, &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'U+', 0x9}, 0x28, 0x1) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:32 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:32 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x100000000}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000100)={r2, 0xf3}, &(0x7f0000000140)=0x8) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x4, 0x0, &(0x7f00000000c0)) 21:04:32 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev={0xac, 0x14, 0x223}}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 575.915793] FAULT_INJECTION: forcing a failure. [ 575.915793] name failslab, interval 1, probability 0, space 0, times 0 [ 575.972539] CPU: 1 PID: 32386 Comm: syz-executor.1 Not tainted 4.19.68 #42 [ 575.979709] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 575.989097] Call Trace: [ 575.991725] dump_stack+0x172/0x1f0 [ 575.995482] should_fail.cold+0xa/0x1b [ 575.999402] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 576.004528] ? lock_downgrade+0x810/0x810 [ 576.008695] __should_failslab+0x121/0x190 [ 576.013043] should_failslab+0x9/0x14 [ 576.016851] kmem_cache_alloc_node_trace+0x274/0x720 [ 576.021968] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 576.021983] ? __might_fault+0x12b/0x1e0 [ 576.022002] __kmalloc_node+0x3d/0x80 [ 576.035390] kvmalloc_node+0x68/0x100 [ 576.039339] ? seq_dentry+0x2d0/0x2d0 [ 576.043158] seq_read+0x817/0x1110 [ 576.046730] ? __inode_security_revalidate+0xda/0x120 [ 576.051925] ? seq_dentry+0x2d0/0x2d0 [ 576.051943] proc_reg_read+0x1f8/0x2b0 [ 576.051964] ? proc_reg_unlocked_ioctl+0x2a0/0x2a0 [ 576.064570] ? security_file_permission+0x89/0x230 [ 576.069510] ? rw_verify_area+0x118/0x360 [ 576.069527] do_iter_read+0x490/0x640 [ 576.069544] ? dup_iter+0x270/0x270 [ 576.081389] vfs_readv+0xf0/0x160 [ 576.084859] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 576.090244] ? kasan_check_read+0x11/0x20 [ 576.094411] ? __fget+0x367/0x540 [ 576.098146] ? iterate_fd+0x360/0x360 [ 576.101972] ? wait_for_completion+0x440/0x440 [ 576.106582] ? __fget_light+0x1a9/0x230 [ 576.110756] do_preadv+0x1c4/0x280 [ 576.114318] ? do_readv+0x370/0x370 [ 576.118042] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 576.122812] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 576.127589] ? do_syscall_64+0x26/0x620 [ 576.131750] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 576.137151] ? do_syscall_64+0x26/0x620 [ 576.141483] __x64_sys_preadv+0x9a/0xf0 [ 576.145500] do_syscall_64+0xfd/0x620 [ 576.149317] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 576.154544] RIP: 0033:0x459879 21:04:32 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0xd001010000000000}, 0x0) 21:04:32 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/5893], 0x1720) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x4009}) r2 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x2, 0x2) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x5e, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x6aa9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, r2, 0x0) close(r3) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x0, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) socket$kcm(0x29, 0x5, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000440)='usereth1trusted%\x00') 21:04:32 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) fstat(r1, &(0x7f0000000200)) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x1c, r5, 0x400, 0x70bd2b, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000040}, 0x8000) ioctl$SIOCX25SENDCALLACCPT(r1, 0x89e9) r6 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x2, 0x101000) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r6, 0x84, 0x4, &(0x7f0000000100), &(0x7f00000001c0)=0x4) ioctl$DRM_IOCTL_RM_MAP(r6, 0x4028641b, &(0x7f00000000c0)={&(0x7f0000ffc000/0x3000)=nil, 0x5, 0x2, 0x1, &(0x7f0000ffc000/0x4000)=nil, 0x1}) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:32 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x500000000000000, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:32 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0xffffff7f00000000}, 0x0) [ 576.157746] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 576.176837] RSP: 002b:00007ff119499c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 576.185097] RAX: ffffffffffffffda RBX: 00007ff119499c90 RCX: 0000000000459879 [ 576.185105] RDX: 0000000000000002 RSI: 0000000020000240 RDI: 0000000000000003 [ 576.185114] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 576.185122] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff11949a6d4 [ 576.185131] R13: 00000000004c6b98 R14: 00000000004dbd88 R15: 0000000000000004 21:04:32 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev={0xac, 0x14, 0x14, 0x2}}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:04:32 executing program 1 (fault-call:1 fault-nth:1): r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/tcp\x00') preadv(r0, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/164, 0xa4}, {&(0x7f0000000180)=""/140, 0x8c}], 0x2, 0x0) 21:04:32 executing program 3: socketpair(0x4, 0x80001, 0x0, &(0x7f0000000080)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 21:04:33 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x600000000000000, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:33 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) [ 576.421654] FAULT_INJECTION: forcing a failure. [ 576.421654] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 576.433703] CPU: 0 PID: 32422 Comm: syz-executor.1 Not tainted 4.19.68 #42 [ 576.440733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 576.450194] Call Trace: [ 576.452802] dump_stack+0x172/0x1f0 [ 576.456453] should_fail.cold+0xa/0x1b [ 576.460376] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 576.465499] ? mark_held_locks+0x100/0x100 [ 576.469763] __alloc_pages_nodemask+0x1ee/0x750 [ 576.476086] ? find_held_lock+0x35/0x130 [ 576.480272] ? __alloc_pages_slowpath+0x2870/0x2870 [ 576.483064] audit: type=1400 audit(1566939873.082:290): avc: denied { map } for pid=32430 comm="syz-executor.0" path="/dev/nullb0" dev="devtmpfs" ino=14881 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=blk_file permissive=1 [ 576.485397] cache_grow_begin+0x91/0x8c0 [ 576.485413] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 576.485432] kmem_cache_alloc_node_trace+0x655/0x720 [ 576.525665] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 576.531206] ? __might_fault+0x12b/0x1e0 [ 576.531229] __kmalloc_node+0x3d/0x80 [ 576.531243] kvmalloc_node+0x68/0x100 [ 576.531258] ? seq_dentry+0x2d0/0x2d0 [ 576.546785] seq_read+0x817/0x1110 [ 576.546816] ? __inode_security_revalidate+0xda/0x120 [ 576.555619] ? seq_dentry+0x2d0/0x2d0 [ 576.559517] proc_reg_read+0x1f8/0x2b0 [ 576.559535] ? proc_reg_unlocked_ioctl+0x2a0/0x2a0 [ 576.559551] ? security_file_permission+0x89/0x230 [ 576.573387] ? rw_verify_area+0x118/0x360 [ 576.577600] do_iter_read+0x490/0x640 [ 576.581414] ? dup_iter+0x270/0x270 [ 576.585068] vfs_readv+0xf0/0x160 [ 576.585090] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 576.594175] ? kasan_check_read+0x11/0x20 [ 576.598342] ? __fget+0x367/0x540 [ 576.601817] ? iterate_fd+0x360/0x360 [ 576.605718] ? wait_for_completion+0x440/0x440 [ 576.610421] ? __fget_light+0x1a9/0x230 [ 576.613252] ------------[ cut here ]------------ [ 576.614529] do_preadv+0x1c4/0x280 [ 576.614547] ? do_readv+0x370/0x370 [ 576.614560] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 576.614576] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 576.626110] generic_make_request: Trying to write to read-only block-device nullb0 (partno 0) [ 576.626561] ? do_syscall_64+0x26/0x620 [ 576.638154] WARNING: CPU: 1 PID: 32432 at block/blk-core.c:2176 generic_make_request_checks+0x1fc5/0x24c0 [ 576.644876] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 576.648832] Kernel panic - not syncing: panic_on_warn set ... [ 576.648832] [ 576.658534] ? do_syscall_64+0x26/0x620 [ 576.675768] __x64_sys_preadv+0x9a/0xf0 [ 576.679742] do_syscall_64+0xfd/0x620 [ 576.684167] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 576.689349] RIP: 0033:0x459879 [ 576.692547] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 576.711780] RSP: 002b:00007ff119499c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 21:04:33 executing program 0: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0x0, 0x381000) r2 = shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000240)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) socket$inet_udplite(0x2, 0x2, 0x88) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x0, 0xf}}, 0x20) r3 = getpid() ioctl$BLKTRACESETUP(r1, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x96, 0x7ff, 0x800005, 0x400, r3}) write$RDMA_USER_CM_CMD_BIND_IP(r1, 0x0, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r1, 0x4004ae8b, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000180)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x228, @remote, 0x4}, r4}}, 0x30) shmctl$IPC_RMID(r2, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]) add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)="102e24ae685b6a4655b5f02b2e3d227009", 0x11, 0xfffffffffffffff8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b91978fbe821f42a002000000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000140)=0xc) prctl$PR_SET_ENDIAN(0x14, 0x2) 21:04:33 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) [ 576.719659] RAX: ffffffffffffffda RBX: 00007ff119499c90 RCX: 0000000000459879 [ 576.726922] RDX: 0000000000000002 RSI: 0000000020000240 RDI: 0000000000000003 [ 576.734185] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 576.741534] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff11949a6d4 [ 576.748883] R13: 00000000004c6b98 R14: 00000000004dbd88 R15: 0000000000000004 [ 576.756341] CPU: 1 PID: 32432 Comm: syz-executor.0 Not tainted 4.19.68 #42 [ 576.763368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 576.772737] Call Trace: [ 576.775508] dump_stack+0x172/0x1f0 [ 576.779147] panic+0x263/0x507 [ 576.782439] ? __warn_printk+0xf3/0xf3 [ 576.786339] ? generic_make_request_checks+0x1fc5/0x24c0 [ 576.791799] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 576.797355] ? __warn.cold+0x5/0x4a [ 576.801002] ? __warn+0xe8/0x1d0 [ 576.804377] ? generic_make_request_checks+0x1fc5/0x24c0 [ 576.809831] __warn.cold+0x20/0x4a [ 576.813379] ? generic_make_request_checks+0x1fc5/0x24c0 [ 576.819109] report_bug+0x263/0x2b0 21:04:33 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x800000000000000, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) 21:04:33 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev={0xac, 0x14, 0x14, 0x3}}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 576.822747] do_error_trap+0x204/0x360 [ 576.826633] ? math_error+0x340/0x340 [ 576.830439] ? wake_up_klogd+0x99/0xd0 [ 576.834335] ? vprintk_emit+0x264/0x690 [ 576.838316] ? vprintk_emit+0x1ab/0x690 [ 576.842306] ? error_entry+0x7c/0xe0 [ 576.846029] ? trace_hardirqs_off_caller+0x65/0x220 [ 576.851064] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 576.856022] do_invalid_op+0x1b/0x20 [ 576.859746] invalid_op+0x14/0x20 [ 576.863225] RIP: 0010:generic_make_request_checks+0x1fc5/0x24c0 21:04:33 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x900000000000000, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) [ 576.869289] Code: 85 1f 04 00 00 45 8b b6 e4 04 00 00 48 8d 73 a0 4c 89 e7 e8 cd 61 06 00 48 c7 c7 60 99 80 87 48 89 c6 44 89 f2 e8 c9 af 2e fe <0f> 0b 48 b8 00 00 00 00 00 fc ff df 4c 89 ea 48 c1 ea 03 80 3c 02 [ 576.879973] kobject: 'loop2' (0000000002ca04db): kobject_uevent_env [ 576.888283] RSP: 0018:ffff888079b2ef08 EFLAGS: 00010286 [ 576.888296] RAX: 0000000000000000 RBX: ffff888079b2efd8 RCX: 0000000000000000 [ 576.888304] RDX: 0000000000000000 RSI: ffffffff8155cdd6 RDI: ffffed100f365dd3 [ 576.888312] RBP: ffff888079b2f000 R08: ffff888094510100 R09: ffff8880945109a0 [ 576.888320] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8880a90b1ac0 [ 576.888328] R13: ffff8880a90b1ac8 R14: 0000000000000000 R15: 0000000000000000 [ 576.888355] ? vprintk_func+0x86/0x189 [ 576.888374] ? generic_make_request_checks+0x1fc5/0x24c0 [ 576.888396] ? trace_event_raw_event_block_rq_requeue+0x600/0x600 [ 576.888417] generic_make_request+0x24c/0x12d0 [ 576.888434] ? blk_get_request+0x710/0x710 [ 576.888450] ? guard_bio_eod+0x1da/0x660 [ 576.888465] ? find_held_lock+0x35/0x130 [ 576.888478] ? guard_bio_eod+0x1da/0x660 21:04:33 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0xa00000000000000, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) [ 576.888492] submit_bio+0xba/0x480 [ 576.888506] ? submit_bio+0xba/0x480 [ 576.928613] kobject: 'loop2' (0000000002ca04db): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 576.929514] ? lock_downgrade+0x810/0x810 [ 576.956506] kobject: 'loop5' (00000000aba0d77a): kobject_uevent_env [ 576.957087] ? generic_make_request+0x12d0/0x12d0 [ 576.957106] ? kasan_check_read+0x11/0x20 [ 576.957124] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 576.957145] ? guard_bio_eod+0x2a1/0x660 [ 576.979651] kobject: 'loop5' (00000000aba0d77a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 576.980879] submit_bh_wbc+0x5dc/0x790 [ 576.980904] __block_write_full_page+0x76e/0x1010 [ 576.980916] ? check_disk_change+0x140/0x140 [ 576.980936] block_write_full_page+0x21f/0x270 [ 577.019252] kobject: 'loop5' (00000000aba0d77a): kobject_uevent_env [ 577.028478] ? check_disk_change+0x140/0x140 [ 577.028497] blkdev_writepage+0x25/0x30 [ 577.028512] __writepage+0x62/0xe0 [ 577.028527] write_cache_pages+0x971/0x1670 [ 577.028539] ? __lock_acquire+0x6ee/0x49c0 21:04:33 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1000000000000000, 0x0, 0x0, &(0x7f0000000480)={[{@errors_recover='errors=recover'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid'}}, {@fmask={'fmask'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask'}}]}) [ 577.028553] ? tag_pages_for_writeback+0x320/0x320 [ 577.028572] ? clear_page_dirty_for_io+0xff0/0xff0 [ 577.028588] ? __lock_acquire+0x6ee/0x49c0 [ 577.028605] ? __lock_acquire+0x6ee/0x49c0 [ 577.028627] generic_writepages+0xe6/0x160 [ 577.060469] kobject: 'loop5' (00000000aba0d77a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 577.061063] ? write_cache_pages+0x1670/0x1670 [ 577.110878] ? wbc_attach_and_unlock_inode+0x51a/0x930 [ 577.116178] ? find_held_lock+0x35/0x130 [ 577.120251] ? blkdev_readpages+0x40/0x40 [ 577.124406] blkdev_writepages+0x1e/0x30 [ 577.128480] do_writepages+0xf3/0x2a0 [ 577.132303] ? page_writeback_cpu_online+0x20/0x20 [ 577.137333] ? kasan_check_read+0x11/0x20 [ 577.141581] ? do_raw_spin_unlock+0x57/0x270 [ 577.146231] ? _raw_spin_unlock+0x2d/0x50 [ 577.150408] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 577.155959] ? wbc_attach_and_unlock_inode+0x5c4/0x930 [ 577.161342] __filemap_fdatawrite_range+0x26d/0x340 [ 577.166456] ? delete_from_page_cache_batch+0xec0/0xec0 21:04:33 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0) [ 577.171839] ? __lock_acquire+0x6ee/0x49c0 [ 577.176087] filemap_write_and_wait+0x47/0xd0 [ 577.180593] __blkdev_put+0x204/0x810 [ 577.184419] ? bd_set_size+0xb0/0xb0 [ 577.188141] ? wait_for_completion+0x440/0x440 [ 577.192737] blkdev_put+0x98/0x560 [ 577.196281] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 577.201825] ? blkdev_put+0x560/0x560 [ 577.205633] blkdev_close+0x8b/0xb0 [ 577.209264] __fput+0x2dd/0x8b0 [ 577.212563] ____fput+0x16/0x20 [ 577.215846] task_work_run+0x145/0x1c0 [ 577.219744] do_exit+0x994/0x2fa0 [ 577.223311] ? get_signal+0x384/0x1fc0 [ 577.223353] kobject: 'loop4' (0000000039f8612e): kobject_uevent_env [ 577.227231] ? mm_update_next_owner+0x660/0x660 [ 577.238310] ? _raw_spin_unlock_irq+0x28/0x90 [ 577.242952] ? get_signal+0x384/0x1fc0 [ 577.246855] ? _raw_spin_unlock_irq+0x28/0x90 [ 577.251361] do_group_exit+0x135/0x370 [ 577.255259] get_signal+0x3ec/0x1fc0 [ 577.258980] ? __might_fault+0x12b/0x1e0 [ 577.261952] kobject: 'loop4' (0000000039f8612e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 577.263146] do_signal+0x95/0x1960 [ 577.263169] ? setup_sigcontext+0x7d0/0x7d0 [ 577.263186] ? kasan_check_read+0x11/0x20 [ 577.263201] ? _copy_to_user+0xc9/0x120 [ 577.263219] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 577.263238] ? __x64_sys_futex+0x40d/0x590 [ 577.263255] ? exit_to_usermode_loop+0x43/0x2c0 [ 577.303676] ? do_syscall_64+0x53d/0x620 [ 577.307755] ? exit_to_usermode_loop+0x43/0x2c0 [ 577.312432] ? lockdep_hardirqs_on+0x415/0x5d0 [ 577.317025] ? trace_hardirqs_on+0x67/0x220 [ 577.321365] exit_to_usermode_loop+0x244/0x2c0 [ 577.325965] do_syscall_64+0x53d/0x620 [ 577.329958] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 577.335148] RIP: 0033:0x459879 [ 577.338343] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 577.358413] RSP: 002b:00007f0cc983dcf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 577.360295] kobject: 'loop4' (0000000039f8612e): kobject_uevent_env [ 577.366130] RAX: fffffffffffffe00 RBX: 000000000075bfd0 RCX: 0000000000459879 [ 577.366138] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 000000000075bfd0 [ 577.366144] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 577.366151] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000075bfd4 [ 577.366158] R13: 00007ffcf58507ff R14: 00007f0cc983e9c0 R15: 000000000075bfd4 [ 577.374056] Kernel Offset: disabled [ 577.414133] Rebooting in 86400 seconds..